WorldWideScience

Sample records for information operations io

  1. Creating Feedback Channels With Optical Communications For Information Operations (IO)

    Science.gov (United States)

    2016-06-01

    amphibious operations. Optical communications technologies, direct marketing principles , and current IO shortfalls are explored to determine whether...technology. First, these concepts are applied to show covert amphibious operations. Optical communications technologies, direct marketing principles , and...power, as per Appendix A. A major portion of the marketing campaign comes in the form of advertising. The correlating principles of advertising in

  2. Electronic Warfare (EW) Historical Perspectives and Its Relationship to Information Operations (IO) - Considerations for Turkey

    National Research Council Canada - National Science Library

    Kucukozyigit, Ali C

    2006-01-01

    ...) and Information Operations (IO) core, supporting and related competencies. Understanding the definitions of information and its value, information superiority, and the decision making cycle provides the foundation for the thesis...

  3. Information Operations Versus Civilian Marketing and Advertising: A Comparative Analysis to Improve IO Planning and Strategy

    National Research Council Canada - National Science Library

    Chilton, Dan

    2008-01-01

    .... must re-focus its efforts on Information Operations to achieve GWOT objectives. In an environment where rapidly advancing technology is drastically improving the individual's ability to conduct IO against the U.S...

  4. Optimization of Cognitive Radio Secondary Information Gathering Station Positioning and Operating Channel Selection for IoT Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jinyi Wen

    2018-01-01

    Full Text Available The Internet of Things (IoT is the interconnection of different objects through the internet using different communication technologies. The objects are equipped with sensors and communications modules. The cognitive radio network is a key technique for the IoT and can effectively address spectrum-related issues for IoT applications. In our paper, a novel method for IoT sensor networks is proposed to obtain the optimal positions of secondary information gathering stations (SIGSs and to select the optimal operating channel. Our objective is to maximize secondary system capacity while protecting the primary system. In addition, we propose an appearance probability matrix for secondary IoT devices (SIDs to maximize the supportable number of SIDs that can be installed in a car, in wearable devices, or for other monitoring devices, based on optimal deployment and probability. We derive fitness functions based on the above objectives and also consider signal to interference-plus-noise ratio (SINR and position constraints. The particle swarm optimization (PSO technique is used to find the best position and operating channel for the SIGSs. In a simulation study, the performance of the proposed method is evaluated and compared with a random resources allocation algorithm (parts of this paper were presented at the ICTC2017 conference (Wen et al., 2017.

  5. Understanding Information Hiding in iOS

    OpenAIRE

    Caviglione, Luca; Mazurczyk, Wojciech

    2014-01-01

    The Apple operating system (iOS) has so far proved resistant to information-hiding techniques, which help attackers covertly communicate. However, Siri - a native iOS service that controls iPhones and iPads via voice commands - could change this trend.

  6. The Use of Information Operations (IO) in Immersive Virtual Environments (IVE)

    Science.gov (United States)

    2010-06-01

    Roll-Playing Game, MMORPG , Cyberspace, Cyber-Warfare. 15. NUMBER OF PAGES 87 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified...4.  Control and Oversight .......................................................................59  5.  IO/ MMORPG Potential...JP Joint Publication MILDEC Military Deception MMORPG Massively Multi-Player Online Role-Playing Game NZSMG Non-Zero Sum Mutual Gaze OPSEC

  7. Electronic Warfare (EW) Historical Perspectives and Its Relationship to Information Operations (IO) - Considerations for Turkey

    Science.gov (United States)

    2006-09-01

    Information Operations IW Information Warfare JDAM Joint Direct Attack Munition JRFL Joint Restricted Frequency List JSTARS Joint...through the preparation of the joint restricted frequency list (JRFL), which includes taboo, guarded and protected frequencies. The EC-130H Compass Call

  8. Information Operations Versus Civilian Marketing and Advertising: A Comparative Analysis to Improve IO Planning and Strategy

    Science.gov (United States)

    2008-03-01

    American Marketing Association expresses fundamental principles of print advertising in a paper written by Steve Blom. Although these principles ...medium if targeting a large group of people was the intention. In addition to medium by negation, civilian marketing professors Kotler , Roberto, and...best suited for which portion of IO. 78 THIS PAGE INTENTIONALLY LEFT BLANK 79 LIST OF REFERENCES Armstrong, Gary and Kotler , Philip. Marketing

  9. IO Sphere: The Professional Journal of Joint Information Operations. Special Edition 2008

    Science.gov (United States)

    2008-01-01

    both the information and political levels; • The natural gas conflict between Ukraine and Russia,; a conflict over meat and milk products trade; as...of friendly forces. Deception is measures designed to mislead the enemy by manipulation, distortion, or falsification of information, to induce...categorizing new methods that are not criminalized in our legislation, such as computer crimes: • Falsif ication of electronic documents and credit cards

  10. The Holistic Targeting (HOT) methodology as the means to improve Information Operations (IO) target development and prioritization

    OpenAIRE

    Ieva, Christopher S.

    2008-01-01

    Prioritization. In response to this challenge, this study proposes five recommendations to enhance IO integration into the Joint Targeting Cycle: the use of interim IO Joint Munitions Effectiveness Manual (JMEM) techniques to better forecast cognitive effects, the adoption of the Measure of Worth (MOW) model to assess IO effects, the HOT methodology to develop and prioritize IO targets, the use of compendium software facilitate targeting problem understanding and the network analysis to...

  11. Instructor/Operator Station (IOS) Design Guide.

    Science.gov (United States)

    1988-02-01

    INSTRUTOR /OPERATOR STATION (IOS) AI O...The three functional categories also define three different users in terms of jobs and qualifications (if the functions have been allocated to manual ...function manually (e.g., collect the data S required from schedules, printed course outlines and telephone calls to training and facility managers).

  12. Information Operations: Where Next?

    National Research Council Canada - National Science Library

    Buchholz, David R

    2005-01-01

    ... to standardized IO training and integration across the combatant commands. For this reason and others there is a compelling argument for the major responsibility for DoD information operations integration to fall under the control of U.S...

  13. Io

    International Nuclear Information System (INIS)

    Nash, D.B.; Yoder, C.F.; Carr, M.H.; Gradie, J.; Hunten, D.M.

    1986-01-01

    The present work reviews the history of Io studies and describes the current level of understanding of Io's physics, chemistry, geology, orbital dynamics, and geophysics. Consideration is given to the satellite's internal, superficial, atmospheric, plasma, and magnetospheric properties and how they interrelate. A pictorial map of Io's surface based on Voyager 1 and 2 images is presented. It is found that Io's surface color and spectra are dominated by sulfur compounds which may include various sulfur allotropes. Volcanic processes yielding three kinds of surface features (vent regions, plains, and mountains) dominate Io's surface geology. The Io plasma torus corotates with Jupiter's magnetic field in the plane of Jupiter's centrifugal equator centered at Io's orbital radius

  14. Sensitive Information Tracking in Commodity IoT

    OpenAIRE

    Celik, Z. Berkay; Babun, Leonardo; Sikder, Amit K.; Aksu, Hidayet; Tan, Gang; McDaniel, Patrick; Uluagac, A. Selcuk

    2018-01-01

    Broadly defined as the Internet of Things (IoT), the growth of commodity devices that integrate physical processes with digital connectivity has had profound effects on society--smart homes, personal monitoring devices, enhanced manufacturing and other IoT apps have changed the way we live, play, and work. Yet extant IoT platforms provide few means of evaluating the use (and potential avenues for misuse) of sensitive information. Thus, consumers and organizations have little information to as...

  15. Research of ios operating system security and the abuse of its exploits

    OpenAIRE

    Jucius, Mindaugas

    2017-01-01

    iOS operating system, which is developed by Apple Inc., is claimed to be the most secure product in the market. In the light of worsening human rights conditions, mainly concerning data privacy breaches performed on governmental level, the need to be reassured about the security of software that runs in our pockets is strengthened. This thesis is focused on researching on potential iOS security exploits and their abuse to access private information or perform malicious actions without user’s ...

  16. Preparing the American Soldier in a Brigade Combat Team to Conduct Information Operations in the Contemporary Operational Environment

    National Research Council Canada - National Science Library

    Beckno, Brian T

    2006-01-01

    ...) to conduct Information Operations (IO) in the Contemporary Operational Environment (COE). First, an explanation of IO and its Army applicability is presented using current examples from military operations in Operation Iraqi Freedom (OIF...

  17. Economics of Internet of Things (IoT): An Information Market Approach

    OpenAIRE

    Niyato, D.; Lu, X.; Wang, P.; Kim, D. I.; Han, Z.

    2015-01-01

    Internet of things (IoT) has been proposed to be a new paradigm of connecting devices and providing services to various applications, e.g., transportation, energy, smart city, and healthcare. In this paper, we focus on an important issue, i.e., economics of IoT, that can have a great impact to the success of IoT applications. In particular, we adopt and present the information economics approach with its applications in IoT. We first review existing economic models developed for IoT services....

  18. Effects of Data Passing Semantics and Operating System Structure on Network I/O Performance

    National Research Council Canada - National Science Library

    Brustoloni, Jose

    1997-01-01

    .... Researchers have often proposed changing the semantics of I/O data passing, so as to make copying unnecessary, or the structure of the operating system, so as to reduce or eliminate data and control passing...

  19. Army Information Operations Officer Needs Analysis Report

    Science.gov (United States)

    2016-03-01

    helping with formatting the final report iv ARMY INFORMATION OPERATIONS OFFICER NEEDS ANALYSIS REPORT EXECUTIVE SUMMARY Research...time.” One IO officer suggested the IPO try to get a access the database that has all the old APA reports archived as a way to look at assessment

  20. A Selective Group Authentication Scheme for IoT-Based Medical Information System.

    Science.gov (United States)

    Park, YoHan; Park, YoungHo

    2017-04-01

    The technology of IoT combined with medical systems is expected to support advanced medical services. However, unsolved security problems, such as misuse of medical devices, illegal access to the medical server and so on, make IoT-based medical systems not be applied widely. In addition, users have a high burden of computation to access Things for the explosive growth of IoT devices. Because medical information is critical and important, but users have a restricted computing power, IoT-based medical systems are required to provide secure and efficient authentication for users. In this paper, we propose a selective group authentication scheme using Shamir's threshold technique. The property of selectivity gives the right of choice to users to form a group which consists of things users select and access. And users can get an access authority for those Things at a time. Thus, our scheme provides an efficient user authentication for multiple Things and conditional access authority for safe IoT-based medical information system. To the best of our knowledge, our proposed scheme is the first in which selectivity is combined with group authentication in IoT environments.

  1. Dynamic Group Management Scheme for Sustainable and Secure Information Sensing in IoT

    Directory of Open Access Journals (Sweden)

    Hyungjoo Kim

    2016-10-01

    Full Text Available The services provided to users in the environment associated with the Internet of Things (hereinafter referred to as IoT begin with the information collected from sensors. It is imperative to transmit high-quality sensor data for providing better services. It is also required to collect data only from those authenticated sensors. Moreover, it is imperative to collect high-quality data on a sustainable and continuous basis in order to provide services anytime and anywhere in the IoT environment. Therefore, high-quality, authenticated sensor networks should be constructed. The most prominent routing protocol to enhance the energy consumption efficiency for the sustainable data collection in a sensor network is the LEACH routing protocol. The LEACH routing protocol transmits sensor data by measuring the energy of sensors and allocating sensor groups dynamically. However, these sensor networks have vulnerabilities such as key leakage, eavesdropping, replay attack and relay attack, given the nature of wireless network communication. A large number of security techniques have been studied in order to solve these vulnerabilities. Nonetheless, these studies still cannot support the dynamic sensor group allocation of the LEACH routing protocol. Furthermore, they are not suitable for the sensor nodes whose hardware computing ability and energy resources are limited. Therefore, this paper proposed a group sensor communication protocol that utilizes only the four fundamental arithmetic operations and logical operation for the sensor node authentication and secure data transmission. Through the security analysis, this paper verified that the proposed scheme was secure to the vulnerabilities resulting from the nature of wireless network communication. Moreover, this paper verified through the performance analysis that the proposed scheme could be utilized efficiently.

  2. A Novel Application of CWMP: An Operator-grade Management Platform for IoT

    Directory of Open Access Journals (Sweden)

    Martin Stusek

    2016-12-01

    Full Text Available The aggressive expansion of emerging smart devices connected to the Internet infrastructure is nowadays considered as one of the most challenging components of the Internet of Things (IoT vision. As a particular segment of IoT, the smart home gateways, also named Machine-Type Communication Gateway (MTCG, become an important direction for industry including telecommunication operators. In most cases, the MTCG acts as a bridge between connected smart objects and the public network (Internet. As a consequence of the IoT domain expansion, the separate configuration of each individual Machine-to-Machine (M2M device is not feasible anymore due to steadily growing numbers of M2M nodes. To perform this task, several novel technologies have recently been introduced. However, legacy protocols and mechanisms for remote network management still retain a certain application potential for IoT. Accordingly, we have investigated the protocol TR-069 with a particular focus on its usability for MTCG. To this end, the software module (bundle based on the TR-069 for remote configuration and management of MTCG, as well as for controlling the end smart devices, has been developed. We believe that our implementation (available as open source on GitHub can serve as an important building block for efficient management of future IoT devices. Therefore, TR-069 protocol constitutes a proven and standardized technology and could be easily deployed by most of the network and service providers today. Authors would like to recall that this paper represents extended version of their previously published work at TSP 2016 conference.

  3. Improving Operational System Performance of Internet of Things (IoT) in Indonesia Telecomunication Company

    Science.gov (United States)

    Dachyar, M.; Risky, S. A.

    2014-06-01

    Telecommunications company have to improve their business performance despite of the increase customers every year. In Indonesia, the telecommunication company have provided best services, improving operational systems by designing a framework for operational systems of the Internet of Things (IoT) other name of Machine to Machine (M2M). This study was conducted with expert opinion which further processed by the Analytic Hierarchy Process (AHP) to obtain important factor for organizations operational systems, and the Interpretive Structural Modeling (ISM) to determine factors of organization which found drives the biggest power. This study resulted, the greatest weight of SLA & KPI handling problems. The M2M current dashboard and current M2M connectivity have power to affect other factors and has important function for M2M operations roomates system which can be effectively carried out.

  4. A Proposal for IoT Dynamic Routes Selection Based on Contextual Information.

    Science.gov (United States)

    Araújo, Harilton da Silva; Filho, Raimir Holanda; Rodrigues, Joel J P C; Rabelo, Ricardo de A L; Sousa, Natanael de C; Filho, José C C L S; Sobral, José V V

    2018-01-26

    The Internet of Things (IoT) is based on interconnection of intelligent and addressable devices, allowing their autonomy and proactive behavior with Internet connectivity. Data dissemination in IoT usually depends on the application and requires context-aware routing protocols that must include auto-configuration features (which adapt the behavior of the network at runtime, based on context information). This paper proposes an approach for IoT route selection using fuzzy logic in order to attain the requirements of specific applications. In this case, fuzzy logic is used to translate in math terms the imprecise information expressed by a set of linguistic rules. For this purpose, four Objective Functions (OFs) are proposed for the Routing Protocol for Low Power and Loss Networks (RPL); such OFs are dynamically selected based on context information. The aforementioned OFs are generated from the fusion of the following metrics: Expected Transmission Count (ETX), Number of Hops (NH) and Energy Consumed (EC). The experiments performed through simulation, associated with the statistical data analysis, conclude that this proposal provides high reliability by successfully delivering nearly 100% of data packets, low delay for data delivery and increase in QoS. In addition, an 30% improvement is attained in the network life time when using one of proposed objective function, keeping the devices alive for longer duration.

  5. A Proposal for IoT Dynamic Routes Selection Based on Contextual Information

    Directory of Open Access Journals (Sweden)

    Harilton da Silva Araújo

    2018-01-01

    Full Text Available The Internet of Things (IoT is based on interconnection of intelligent and addressable devices, allowing their autonomy and proactive behavior with Internet connectivity. Data dissemination in IoT usually depends on the application and requires context-aware routing protocols that must include auto-configuration features (which adapt the behavior of the network at runtime, based on context information. This paper proposes an approach for IoT route selection using fuzzy logic in order to attain the requirements of specific applications. In this case, fuzzy logic is used to translate in math terms the imprecise information expressed by a set of linguistic rules. For this purpose, four Objective Functions (OFs are proposed for the Routing Protocol for Low Power and Loss Networks (RPL; such OFs are dynamically selected based on context information. The aforementioned OFs are generated from the fusion of the following metrics: Expected Transmission Count (ETX, Number of Hops (NH and Energy Consumed (EC. The experiments performed through simulation, associated with the statistical data analysis, conclude that this proposal provides high reliability by successfully delivering nearly 100% of data packets, low delay for data delivery and increase in QoS. In addition, an 30% improvement is attained in the network life time when using one of proposed objective function, keeping the devices alive for longer duration.

  6. Panel summary of cyber-physical systems (CPS) and Internet of Things (IoT) opportunities with information fusion

    Science.gov (United States)

    Blasch, Erik; Kadar, Ivan; Grewe, Lynne L.; Brooks, Richard; Yu, Wei; Kwasinski, Andres; Thomopoulos, Stelios; Salerno, John; Qi, Hairong

    2017-05-01

    During the 2016 SPIE DSS conference, nine panelists were invited to highlight the trends and opportunities in cyber-physical systems (CPS) and Internet of Things (IoT) with information fusion. The world will be ubiquitously outfitted with many sensors to support our daily living thorough the Internet of Things (IoT), manage infrastructure developments with cyber-physical systems (CPS), as well as provide communication through networked information fusion technology over the internet (NIFTI). This paper summarizes the panel discussions on opportunities of information fusion to the growing trends in CPS and IoT. The summary includes the concepts and areas where information supports these CPS/IoT which includes situation awareness, transportation, and smart grids.

  7. Perception Management: A Core IO Capability

    National Research Council Canada - National Science Library

    Zaman, Khyber

    2007-01-01

    This thesis postulates that in today's media environment, with adversaries skillfully using propaganda to skirt nations' resolve, Perception Management is key to military success and should be an Information Operations (IO) Core Capability...

  8. Users of the main smartphone operating systems (iOS, Android) differ only little in personality.

    Science.gov (United States)

    Götz, Friedrich M; Stieger, Stefan; Reips, Ulf-Dietrich

    2017-01-01

    The increasingly widespread use of mobile phone applications (apps) as research tools and cost-effective means of vast data collection raises new methodological challenges. In recent years, it has become a common practice for scientists to design apps that run only on a single operating system, thereby excluding large numbers of users who use a different operating system. However, empirical evidence investigating any selection biases that might result thereof is scarce. Henceforth, we conducted two studies drawing from a large multi-national (Study 1; N = 1,081) and a German-speaking sample (Study 2; N = 2,438). As such Study 1 compared iOS and Android users across an array of key personality traits (i.e., well-being, self-esteem, willingness to take risks, optimism, pessimism, Dark Triad, and the Big Five). Focusing on Big Five personality traits in a broader scope, in addition to smartphone users, Study 2 also examined users of the main computer operating systems (i.e., Mac OS, Windows). In both studies, very few significant differences were found, all of which were of small or even tiny effect size mostly disappearing after sociodemographics had been controlled for. Taken together, minor differences in personality seem to exist, but they are of small to negligible effect size (ranging from OR = 0.919 to 1.344 (Study 1), ηp2 = .005 to .036 (Study 2), respectively) and may reflect differences in sociodemographic composition, rather than operating system of smartphone users.

  9. A Network Coverage Information-Based Sensor Registry System for IoT Environments.

    Science.gov (United States)

    Jung, Hyunjun; Jeong, Dongwon; Lee, Sukhoon; On, Byung-Won; Baik, Doo-Kwon

    2016-07-25

    The Internet of Things (IoT) is expected to provide better services through the interaction of physical objects via the Internet. However, its limitations cause an interoperability problem when the sensed data are exchanged between the sensor nodes in wireless sensor networks (WSNs), which constitute the core infrastructure of the IoT. To address this problem, a Sensor Registry System (SRS) is used. By using a SRS, the information of the heterogeneous sensed data remains pure. If users move along a road, their mobile devices predict their next positions and obtain the sensed data for that position from the SRS. If the WSNs in the location in which the users move are unstable, the sensed data will be lost. Consider a situation where the user passes through dangerous areas. If the user's mobile device cannot receive information, they cannot be warned about the dangerous situation. To avoid this, two novel SRSs that use network coverage information have been proposed: one uses OpenSignal and the other uses the probabilistic distribution of the users accessing SRS. The empirical study showed that the proposed method can seamlessly provide services related to sensing data under any abnormal circumstance.

  10. Smart Collaborative Caching for Information-Centric IoT in Fog Computing.

    Science.gov (United States)

    Song, Fei; Ai, Zheng-Yang; Li, Jun-Jie; Pau, Giovanni; Collotta, Mario; You, Ilsun; Zhang, Hong-Ke

    2017-11-01

    The significant changes enabled by the fog computing had demonstrated that Internet of Things (IoT) urgently needs more evolutional reforms. Limited by the inflexible design philosophy; the traditional structure of a network is hard to meet the latest demands. However, Information-Centric Networking (ICN) is a promising option to bridge and cover these enormous gaps. In this paper, a Smart Collaborative Caching (SCC) scheme is established by leveraging high-level ICN principles for IoT within fog computing paradigm. The proposed solution is supposed to be utilized in resource pooling, content storing, node locating and other related situations. By investigating the available characteristics of ICN, some challenges of such combination are reviewed in depth. The details of building SCC, including basic model and advanced algorithms, are presented based on theoretical analysis and simplified examples. The validation focuses on two typical scenarios: simple status inquiry and complex content sharing. The number of clusters, packet loss probability and other parameters are also considered. The analytical results demonstrate that the performance of our scheme, regarding total packet number and average transmission latency, can outperform that of the original ones. We expect that the SCC will contribute an efficient solution to the related studies.

  11. Smart Collaborative Caching for Information-Centric IoT in Fog Computing

    Directory of Open Access Journals (Sweden)

    Fei Song

    2017-11-01

    Full Text Available The significant changes enabled by the fog computing had demonstrated that Internet of Things (IoT urgently needs more evolutional reforms. Limited by the inflexible design philosophy; the traditional structure of a network is hard to meet the latest demands. However, Information-Centric Networking (ICN is a promising option to bridge and cover these enormous gaps. In this paper, a Smart Collaborative Caching (SCC scheme is established by leveraging high-level ICN principles for IoT within fog computing paradigm. The proposed solution is supposed to be utilized in resource pooling, content storing, node locating and other related situations. By investigating the available characteristics of ICN, some challenges of such combination are reviewed in depth. The details of building SCC, including basic model and advanced algorithms, are presented based on theoretical analysis and simplified examples. The validation focuses on two typical scenarios: simple status inquiry and complex content sharing. The number of clusters, packet loss probability and other parameters are also considered. The analytical results demonstrate that the performance of our scheme, regarding total packet number and average transmission latency, can outperform that of the original ones. We expect that the SCC will contribute an efficient solution to the related studies.

  12. Smart Collaborative Caching for Information-Centric IoT in Fog Computing

    Science.gov (United States)

    Song, Fei; Ai, Zheng-Yang; Li, Jun-Jie; Zhang, Hong-Ke

    2017-01-01

    The significant changes enabled by the fog computing had demonstrated that Internet of Things (IoT) urgently needs more evolutional reforms. Limited by the inflexible design philosophy; the traditional structure of a network is hard to meet the latest demands. However, Information-Centric Networking (ICN) is a promising option to bridge and cover these enormous gaps. In this paper, a Smart Collaborative Caching (SCC) scheme is established by leveraging high-level ICN principles for IoT within fog computing paradigm. The proposed solution is supposed to be utilized in resource pooling, content storing, node locating and other related situations. By investigating the available characteristics of ICN, some challenges of such combination are reviewed in depth. The details of building SCC, including basic model and advanced algorithms, are presented based on theoretical analysis and simplified examples. The validation focuses on two typical scenarios: simple status inquiry and complex content sharing. The number of clusters, packet loss probability and other parameters are also considered. The analytical results demonstrate that the performance of our scheme, regarding total packet number and average transmission latency, can outperform that of the original ones. We expect that the SCC will contribute an efficient solution to the related studies. PMID:29104219

  13. Caching-Aided Collaborative D2D Operation for Predictive Data Dissemination in Industrial IoT

    OpenAIRE

    Orsino, Antonino; Kovalchukov, Roman; Samuylov, Andrey; Moltchanov, Dmitri; Andreev, Sergey; Koucheryavy, Yevgeni; Valkama, Mikko

    2018-01-01

    Industrial automation deployments constitute challenging environments where moving IoT machines may produce high-definition video and other heavy sensor data during surveying and inspection operations. Transporting massive contents to the edge network infrastructure and then eventually to the remote human operator requires reliable and high-rate radio links supported by intelligent data caching and delivery mechanisms. In this work, we address the challenges of contents dissemination in chara...

  14. Users of the main smartphone operating systems (iOS, Android differ only little in personality.

    Directory of Open Access Journals (Sweden)

    Friedrich M Götz

    Full Text Available The increasingly widespread use of mobile phone applications (apps as research tools and cost-effective means of vast data collection raises new methodological challenges. In recent years, it has become a common practice for scientists to design apps that run only on a single operating system, thereby excluding large numbers of users who use a different operating system. However, empirical evidence investigating any selection biases that might result thereof is scarce. Henceforth, we conducted two studies drawing from a large multi-national (Study 1; N = 1,081 and a German-speaking sample (Study 2; N = 2,438. As such Study 1 compared iOS and Android users across an array of key personality traits (i.e., well-being, self-esteem, willingness to take risks, optimism, pessimism, Dark Triad, and the Big Five. Focusing on Big Five personality traits in a broader scope, in addition to smartphone users, Study 2 also examined users of the main computer operating systems (i.e., Mac OS, Windows. In both studies, very few significant differences were found, all of which were of small or even tiny effect size mostly disappearing after sociodemographics had been controlled for. Taken together, minor differences in personality seem to exist, but they are of small to negligible effect size (ranging from OR = 0.919 to 1.344 (Study 1, ηp2 = .005 to .036 (Study 2, respectively and may reflect differences in sociodemographic composition, rather than operating system of smartphone users.

  15. Users of the main smartphone operating systems (iOS, Android) differ only little in personality

    Science.gov (United States)

    Stieger, Stefan; Reips, Ulf-Dietrich

    2017-01-01

    The increasingly widespread use of mobile phone applications (apps) as research tools and cost-effective means of vast data collection raises new methodological challenges. In recent years, it has become a common practice for scientists to design apps that run only on a single operating system, thereby excluding large numbers of users who use a different operating system. However, empirical evidence investigating any selection biases that might result thereof is scarce. Henceforth, we conducted two studies drawing from a large multi-national (Study 1; N = 1,081) and a German-speaking sample (Study 2; N = 2,438). As such Study 1 compared iOS and Android users across an array of key personality traits (i.e., well-being, self-esteem, willingness to take risks, optimism, pessimism, Dark Triad, and the Big Five). Focusing on Big Five personality traits in a broader scope, in addition to smartphone users, Study 2 also examined users of the main computer operating systems (i.e., Mac OS, Windows). In both studies, very few significant differences were found, all of which were of small or even tiny effect size mostly disappearing after sociodemographics had been controlled for. Taken together, minor differences in personality seem to exist, but they are of small to negligible effect size (ranging from OR = 0.919 to 1.344 (Study 1), ηp2 = .005 to .036 (Study 2), respectively) and may reflect differences in sociodemographic composition, rather than operating system of smartphone users. PMID:28467473

  16. Information Operations Primer

    Science.gov (United States)

    2008-11-01

    Nomination/Assignment/Allotment. • Electronic Warfare (EW) deconfliction via Joint Restricted Frequency List (JRFL) creation and analysis. • JRFL...restricted frequency list . The objectives of defensive IO include the following: 111 ■ Sustain the MAGTF commander‘s freedom of action...estimates and are also applied during the analysis and selection of friendly courses of action. (JP 1-02) Joint restricted frequency list (JRFL) A

  17. iOS app development for dummies

    CERN Document Server

    Feiler, Jesse

    2014-01-01

    If you've got incredible iOS ideas, get this book and bring them to life! iOS 7 represents the most significant update to Apple's mobile operating system since the first iPhone was released, and even the most seasoned app developers are looking for information on how to take advantage of the latest iOS 7 features in their app designs. That's where iOS App Development For Dummies comes in! Whether you're a programming hobbyist wanting to build an app for fun or a professional developer looking to expand into the iOS market, this book will walk you through the fundamentals of building a univer

  18. IoT Enabled Low Cost Wearable Device for Location and Information Tracking System

    Directory of Open Access Journals (Sweden)

    Kamaludin Nur Atika Binti

    2017-01-01

    Full Text Available An internet-of-things (IoT enabled low cost wearable device for location and information tracking system is developed to monitor and ensure the safety of the children while their parents are away either to work or abroad. This system aims to ensure human safety especially the children and efficiently initiate search and rescue in the event of emergencies. The device will notify the parents on the condition of the surroundings of the children, specifically inside the house and notify the parents if the children are outside the target area by using the application developed in the smartphone. The system uses a microcomputer called Beagle-Bone Black (BBB as the processor while GPS and LTE technology for wireless communication. Future improvement mainly focuses on reducing the size and power consumption of the device, improving communication module, and optimizing microcomputer’s specification.

  19. A reference architecture for IoT-based logistic information systems in agrifood supply chains

    NARCIS (Netherlands)

    Verdouw, C.N.; Robbemond, R.M.; Verwaart, T.; Wolfert, J.; Beulens, A.J.M.

    2015-01-01

    Logistics in the food and agribusiness industry must address perishable products, unpredictable supply variations and stringent food safety and sustainability requirements. The Internet of Things (IoT) could contribute significantly to solve these challenges because it allows for remotely

  20. IoT-Based Information System for Healthcare Application: Design Methodology Approach

    Directory of Open Access Journals (Sweden)

    Damian Dziak

    2017-06-01

    Full Text Available Over the last few decades, life expectancy has increased significantly. However, elderly people who live on their own often need assistance due to mobility difficulties, symptoms of dementia or other health problems. In such cases, an autonomous supporting system may be helpful. This paper proposes the Internet of Things (IoT-based information system for indoor and outdoor use. Since the conducted survey of related works indicated a lack of methodological approaches to the design process, therefore a Design Methodology (DM, which approaches the design target from the perspective of the stakeholders, contracting authorities and potential users, is introduced. The implemented solution applies the three-axial accelerometer and magnetometer, Pedestrian Dead Reckoning (PDR, thresholding and the decision trees algorithm. Such an architecture enables the localization of a monitored person within four room-zones with accuracy; furthermore, it identifies falls and the activities of lying, standing, sitting and walking. Based on the identified activities, the system classifies current activities as normal, suspicious or dangerous, which is used to notify the healthcare staff about possible problems. The real-life scenarios validated the high robustness of the proposed solution. Moreover, the test results satisfied both stakeholders and future users and ensured further cooperation with the project.

  1. Reactor operation environmental information document

    Energy Technology Data Exchange (ETDEWEB)

    Bauer, L.R.; Hayes, D.W.; Hunter, C.H.; Marter, W.L.; Moyer, R.A.

    1989-12-01

    This volume is a reactor operation environmental information document for the Savannah River Plant. Topics include meteorology, surface hydrology, transport, environmental impacts, and radiation effects. 48 figs., 56 tabs. (KD)

  2. Information Operations: Training the Leaders

    National Research Council Canada - National Science Library

    Ferriter, Michael

    1999-01-01

    The purpose of this project is to determine if the Army's officer education and training systems adequately prepare our leaders to operate within, and to deploy, fight, and win in the Information Age...

  3. Radiation Hardened High Speed Integrated Circuits SERDES I/O for Extreme Operating Environments, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Manned and robotic space missions require high-performance electronic control systems capable of operating for extended periods in harsh environments subject to...

  4. ?Healthcare IoT m-GreenCARDIO Remote Cardiac Monitoring System - Concept, Theory of Operation and Implementation

    Directory of Open Access Journals (Sweden)

    ZAGAN, I.

    2017-05-01

    Full Text Available Present day Internet of Things (IoT developers are inspired by the spectacular evolution in the field, and, at the same time, determined to connect an increasingly wider range of 'things', with the lowest power consumption, the wider range of action and interoperability guaranteed with excessive quality. Based on current challenges in the medical and electronic field, the present paper seeks the practical implementation of an efficient, low cost, low-power IoT medical system, yet with a greater memory autonomy. In this context, our main contribution is the implementation of a solution for ECG monitoring based on IoT techniques. This paper presents a qualitative research in the field of healthcare IoT and embedded applications meant to provide an innovative and flexible system meeting the stringent requirements of this area. Without compromising the performance intake and the low power consumption, the designers offer flexible options for connectivity and response time.

  5. FabIO

    DEFF Research Database (Denmark)

    Bergbäck Knudsen, Erik; Sørensen, Henning O.; Wright, Jonathan P.

    2013-01-01

    FabIO is a Python module written for easy and transparent reading of raw two-dimensional data from various X-ray detectors. The module provides a function for reading any image and returning a fabioimage object which contains both metadata (header information) and the raw data. All fabioimage...

  6. Developing a knowledge system for information operations

    CSIR Research Space (South Africa)

    Leenen, L

    2011-03-01

    Full Text Available In this paper we describe a research project to develop an optimal information retrieval system in an Information Operations domain. Information Operations is the application and management of information to gain an advantage over an opponent...

  7. Loose-Lipped Mobile Device Intelligent Personal Assistants: A Discussion of Information Gleaned from Siri on Locked iOS Devices.

    Science.gov (United States)

    Horsman, Graeme

    2018-04-23

    The forensic analysis of mobile handsets is becoming a more prominent factor in many criminal investigations. Despite such devices frequently storing relevant evidential content to support an investigation, accessing this information is becoming an increasingly difficult task due to enhanced effective security features. Where access to a device's resident data is not possible via traditional mobile forensic methods, in some cases it may still be possible to extract user information via queries made to an installed intelligent personal assistant. This article presents an evaluation of the information which is retrievable from Apple's Siri when interacted with on a locked iOS device running iOS 11.2.5 (the latest at the time of testing). The testing of verbal commands designed to elicit a response from Siri demonstrate the ability to recover call log, SMS, Contacts, Apple Maps, Calendar, and device information which may support any further investigation. © 2018 American Academy of Forensic Sciences.

  8. High performance parallel I/O

    CERN Document Server

    Prabhat

    2014-01-01

    Gain Critical Insight into the Parallel I/O EcosystemParallel I/O is an integral component of modern high performance computing (HPC), especially in storing and processing very large datasets to facilitate scientific discovery. Revealing the state of the art in this field, High Performance Parallel I/O draws on insights from leading practitioners, researchers, software architects, developers, and scientists who shed light on the parallel I/O ecosystem.The first part of the book explains how large-scale HPC facilities scope, configure, and operate systems, with an emphasis on choices of I/O har

  9. Information Practices and User Interfaces: Student Use of an iOS Application in Special Education

    Science.gov (United States)

    Demmans Epp, Carrie; McEwen, Rhonda; Campigotto, Rachelle; Moffatt, Karyn

    2016-01-01

    A framework connecting concepts from user interface design with those from information studies is applied in a study that integrated a location-aware mobile application into two special education classes at different schools; this application had two support modes (one general and one location specific). The five-month study revealed several…

  10. Exploring the Far Side of Mobile Health: Information Security and Privacy of Mobile Health Apps on iOS and Android.

    Science.gov (United States)

    Dehling, Tobias; Gao, Fangjian; Schneider, Stephan; Sunyaev, Ali

    2015-01-19

    Mobile health (mHealth) apps aim at providing seamless access to tailored health information technology and have the potential to alleviate global health burdens. Yet, they bear risks to information security and privacy because users need to reveal private, sensitive medical information to redeem certain benefits. Due to the plethora and diversity of available mHealth apps, implications for information security and privacy are unclear and complex. The objective of this study was to establish an overview of mHealth apps offered on iOS and Android with a special focus on potential damage to users through information security and privacy infringements. We assessed apps available in English and offered in the categories "Medical" and "Health & Fitness" in the iOS and Android App Stores. Based on the information retrievable from the app stores, we established an overview of available mHealth apps, tagged apps to make offered information machine-readable, and clustered the discovered apps to identify and group similar apps. Subsequently, information security and privacy implications were assessed based on health specificity of information available to apps, potential damage through information leaks, potential damage through information manipulation, potential damage through information loss, and potential value of information to third parties. We discovered 24,405 health-related apps (iOS; 21,953; Android; 2452). Absence or scarceness of ratings for 81.36% (17,860/21,953) of iOS and 76.14% (1867/2452) of Android apps indicates that less than a quarter of mHealth apps are in more or less widespread use. Clustering resulted in 245 distinct clusters, which were consolidated into 12 app archetypes grouping clusters with similar assessments of potential damage through information security and privacy infringements. There were 6426 apps that were excluded during clustering. The majority of apps (95.63%, 17,193/17,979; of apps) pose at least some potential damage through

  11. Exploring the Far Side of Mobile Health: Information Security and Privacy of Mobile Health Apps on iOS and Android

    Science.gov (United States)

    Dehling, Tobias; Gao, Fangjian; Schneider, Stephan

    2015-01-01

    Background Mobile health (mHealth) apps aim at providing seamless access to tailored health information technology and have the potential to alleviate global health burdens. Yet, they bear risks to information security and privacy because users need to reveal private, sensitive medical information to redeem certain benefits. Due to the plethora and diversity of available mHealth apps, implications for information security and privacy are unclear and complex. Objective The objective of this study was to establish an overview of mHealth apps offered on iOS and Android with a special focus on potential damage to users through information security and privacy infringements. Methods We assessed apps available in English and offered in the categories “Medical” and “Health & Fitness” in the iOS and Android App Stores. Based on the information retrievable from the app stores, we established an overview of available mHealth apps, tagged apps to make offered information machine-readable, and clustered the discovered apps to identify and group similar apps. Subsequently, information security and privacy implications were assessed based on health specificity of information available to apps, potential damage through information leaks, potential damage through information manipulation, potential damage through information loss, and potential value of information to third parties. Results We discovered 24,405 health-related apps (iOS; 21,953; Android; 2452). Absence or scarceness of ratings for 81.36% (17,860/21,953) of iOS and 76.14% (1867/2452) of Android apps indicates that less than a quarter of mHealth apps are in more or less widespread use. Clustering resulted in 245 distinct clusters, which were consolidated into 12 app archetypes grouping clusters with similar assessments of potential damage through information security and privacy infringements. There were 6426 apps that were excluded during clustering. The majority of apps (95.63%, 17,193/17,979; of apps) pose

  12. Dominating Duffer’s Domain: Lessons for the U.S. Marine corps Information Operations Practitioner

    Science.gov (United States)

    2017-01-01

    has learned 26 hard -won lessons that readers may find useful for the future conduct and planning of IO. The principles espoused here were derived from...to be frank, it wasn’t that hard . I had done the ten-day Intermediate MAGTF (Marine Air Ground Task Force) Information Operations Practitioner...paragraph, with no phases. It was, however, beauti- fully formatted , and the task listing had everything: military deception, electronic warfare, OPSEC

  13. Development of eStudent iOS mobile application

    Directory of Open Access Journals (Sweden)

    Mladjan Antic

    2013-01-01

    Full Text Available Abstract— iOS is the Apple mobile operating system, for Apple mobile devices. Initially developed for iPhone, and later for iPod Touch, iPad, AppleTV. The Metropolitan University has a Web application titled eStudent, which enables students by Web to get information about their marks for all subjects, their financies, exam scheduling, professors and assistents, and send exam registration and feedback about teaching, etc. This paper explains the development of the mobile application eStudent on the iOS platform. This application enables students whenever they want, by using their iPhone mobile phone, to get access to the information from the eStudent Web application, and to present it on their iPhone User Interface (UI. This paper explains in details software requirements analysis, system architecture, system modelling, and UI of the eStudent iOS mobile application.

  14. Io's Pele Hemisphere

    Science.gov (United States)

    1996-01-01

    Jupiter's moon Io with Pele prominently in view. The inset images are from the Voyager 1 (top) and 2 (bottom) spacecraft using the violet, blue, and orange filters. The large image is from Galileo, using the violet, green, and red filters. The colors in the Galileo image are closer to what the human eye would see. With the filters used in the Solid State Imaging system on Galileo, it is clear now that some of the recent volcanic deposits on Io are indeed very red, a point not resolved by Voyager. Scientists speculate that the red deposits are a form of Sulfur produced in volcanic eruptions on Io. Note the rapid changes seen in the shape of the distal (far from the vent) plume deposits from Pele between Voyagers 1 (April, 1979) and 2 (July, 1979). The Galileo image was obtained by the imaging system on board the spacecraft in June, 1996. North is to the top.The Jet Propulsion Laboratory, Pasadena, CA manages the mission for NASA'is Office of Space Science, Washington, DC.This image and other images and data received from Galileo are posted on the World Wide Web, on the Galileo mission home page at URL http://galileo.jpl.nasa.gov. Background information and educational context for the images can be found at URL http://www.jpl.nasa.gov/galileo/sepo

  15. INFORMATION ASSURANCE - INTELLIGENCE - INFORMATION SUPERIORITY RELATIONSHIP WITHIN NATO OPERATIONS

    Directory of Open Access Journals (Sweden)

    Gheorghe BOARU, Ioan-Mihai ILIEŞ

    2011-01-01

    Full Text Available There is a tight relationship between information assurance, the intelligence cycle and information superiority within NATO operations. The intelligence cycle has a discrete architecture and provides on-time and relevant intelligence products to the joint force commanders and to other authorized users in a specifi c joint area of operations. The intelligence cycle must follow the evolution of the operation. A permanent intelligence estimate will be performed during the military decision making process and operations execution. Information superiority is one of the most powerful intelligence cycle achievements. and decisively infuences the success of NATO joint operations. Information superiority must be preserved and enhanced through information assurance. Information assurance is an information operation that must be planned by the military in charge of operation security or by non-military experts, executed by all personnel during the entire intelligence cycle life time and employed during the planning and execution of NATO joint operations.

  16. DMIA: A MALWARE DETECTION SYSTEM ON IOS PLATFORM

    OpenAIRE

    Hongliang Liang; Yilun Xie; Yan Song

    2016-01-01

    iOS is a popular operating system on Apple’s smartphones, and recent security events have shown the possibility of stealing the users' privacy in iOS without being detected, such as XcodeGhost. So, we present the design and implementation of a malware vetting system, called DMIA. DMIA first collects runtime information of an app and then distinguish between malicious and normal apps by a novel machine learning model. We evaluated DMIA with 1000 apps from the official App Store. The results of...

  17. Reactor operation safety information document

    Energy Technology Data Exchange (ETDEWEB)

    1990-01-01

    The report contains a reactor facility description which includes K, P, and L reactor sites, structures, operating systems, engineered safety systems, support systems, and process and effluent monitoring systems; an accident analysis section which includes cooling system anomalies, radioactive materials releases, and anticipated transients without scram; a summary of onsite doses from design basis accidents; severe accident analysis (reactor core disruption); a description of operating contractor organization and emergency planning; and a summary of reactor safety evolution. (MB)

  18. You have been Friended by the U.S. Military; Using Social Networking Services for IO Messaging

    Science.gov (United States)

    2010-12-01

    order 69 Dan Chilton, “Information Operations versus Civilian Marketing and Advertising : A Comparative...the availability of the product, its price and its place. 74 Chilton, “Information Operations versus Civilian Marketing and Advertising ,” 24. 75...Information Operations versus Civilian Marketing and Advertising : A Comparative Analysis to Improve IO Planning and Strategy.” Master of Science in

  19. Reactor operation environmental information document

    Energy Technology Data Exchange (ETDEWEB)

    Haselow, J.S.; Price, V.; Stephenson, D.E.; Bledsoe, H.W.; Looney, B.B.

    1989-12-01

    The Savannah River Site (SRS) produces nuclear materials, primarily plutonium and tritium, to meet the requirements of the Department of Defense. These products have been formed in nuclear reactors that were built during 1950--1955 at the SRS. K, L, and P reactors are three of five reactors that have been used in the past to produce the nuclear materials. All three of these reactors discontinued operation in 1988. Currently, intense efforts are being extended to prepare these three reactors for restart in a manner that protects human health and the environment. To document that restarting the reactors will have minimal impacts to human health and the environment, a three-volume Reactor Operations Environmental Impact Document has been prepared. The document focuses on the impacts of restarting the K, L, and P reactors on both the SRS and surrounding areas. This volume discusses the geology, seismology, and subsurface hydrology. 195 refs., 101 figs., 16 tabs.

  20. Terrorist Approach to Information Operations

    Science.gov (United States)

    2003-06-01

    its fold; they also represent an understanding of the value of the information medium by setting the group up as the underdog against the large...up and organized street demonstrations to lobby for civil rights. The Stormont (Irish) government branded the movement a front for the IRA and

  1. Erosional scarps on Io

    International Nuclear Information System (INIS)

    McCauley, J.F.; Soderblom, L.A.; Smith, B.A.

    1979-01-01

    Irregular or fretted scarps on Io as revealed during the voyager 1 mission are similar to those found on Earth and Mars. A sapping mechanism involving liquid SO 2 is proposed to explain these complexly eroded terrains on Io. (author)

  2. Cyber Power Theory First, Then Information Operations

    National Research Council Canada - National Science Library

    Smart, Antoinette G

    2001-01-01

    ...) seems disconcerting, at least on the surface. Think tanks, government research organizations, and learned individuals have all pointed to the need for a viable theory of IO, yet no such theory has emerged...

  3. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.

    Science.gov (United States)

    Ali, Bako; Awad, Ali Ismail

    2018-03-08

    The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or "things" to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.

  4. Information Operations Versus Civilian Marketing and Advertising: A Comparative Analysis to Improve IO Planning and Strategy

    National Research Council Canada - National Science Library

    Chilton, Dan

    2008-01-01

    .... and given the political and moral restrictions placed on U.S. military action, having the most powerful and technologically advanced capabilities in the world no longer guarantees success. The U.S...

  5. Reactor operation environmental information document

    Energy Technology Data Exchange (ETDEWEB)

    Wike, L.D.; Specht, W.L.; Mackey, H.E.; Paller, M.H.; Wilde, E.W.; Dicks, A.S.

    1989-12-01

    The Savannah River Site (SRS) is a large United States Department of Energy installation on the upper Atlantic Coastal Plain of South Carolina. The SRS contains diverse habitats, flora, and fauna. Habitats include upland terrestrial areas, varied wetlands including Carolina Bays, the Savannah River swamp system, and impoundment related and riparian wetlands, and the aquatic habitats of several stream systems, two large cooling reservoirs, and the Savannah River. These diverse habitats support a large variety of plants and animals including many commercially or recreational valuable species and several rare, threatened or endangered species. This volume describes the major habitats and their biota found on the SRS, and discuss the impacts of continued operation of the K, L, and P production reactors.

  6. Active Volcanic Eruptions on Io

    Science.gov (United States)

    1996-01-01

    Six views of the volcanic plume named Prometheus, as seen against Io's disk and near the bright limb (edge) of the satellite by the SSI camera on the Galileo spacecraft during its second (G2) orbit of Jupiter. North is to the top of each frame. To the south-southeast of Prometheus is another bright spot that appears to be an active plume erupting from a feature named Culann Patera. Prometheus was active 17 years ago during both Voyager flybys, but no activity was detected by Voyager at Culann. Both of these plumes were seen to glow in the dark in an eclipse image acquired by the imaging camera during Galileo's first (G1) orbit, and hot spots at these locations were detected by Galileo's Near-Infrared Mapping Spectrometer.The plumes are thought to be driven by heating sulfur dioxide in Io's subsurface into an expanding fluid or 'geyser'. The long-lived nature of these eruptions requires that a substantial supply of sulfur dioxide must be available in Io's subsurface, similar to groundwater. Sulfur dioxide gas condenses into small particles of 'snow' in the expanding plume, and the small particles scatter light and appear bright at short wavelengths. The images shown here were acquired through the shortest-wavelength filter (violet) of the Galileo camera. Prometheus is about 300 km wide and 75 km high and Culann is about 150 km wide and less than 50 km high. The images were acquired on September 4, 1996 at a range of 2,000,000 km (20 km/pixel resolution). Prometheus is named after the Greek fire god and Culann is named after the Celtic smith god.The Jet Propulsion Laboratory, Pasadena, CA manages the Galileo mission for NASA's Office of Space Science, Washington, DC. JPL is an operating division of California Institute of Technology (Caltech).This image and other images and data received from Galileo are posted on the World Wide Web, on the Galileo mission home page at URL http://galileo.jpl.nasa.gov. Background information and educational context for the images can

  7. Occurrence reporting and processing of operations information

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-07-21

    DOE O 232.1A, Occurrence Reporting and Processing of Operations Information, and 10 CFR 830.350, Occurrence Reporting and Processing of Operations Information (when it becomes effective), along with this manual, set forth occurrence reporting requirements for Department of Energy (DOE) Departmental Elements and contractors responsible for the management and operation of DOE-owned and -leased facilities. These requirements include categorization of occurrences related to safety, security, environment, health, or operations (``Reportable Occurrences``); DOE notification of these occurrences; and the development and submission of documented follow-up reports. This Manual provides detailed information for categorizing and reporting occurrences at DOE facilities. Information gathered by the Occurrence Reporting and processing System is used for analysis of the Department`s performance in environmental protection, safeguards and security, and safety and health of its workers and the public. This information is also used to develop lessons learned and document events that significantly impact DOE operations.

  8. Occurrence reporting and processing of operations information

    International Nuclear Information System (INIS)

    1997-01-01

    DOE O 232.1A, Occurrence Reporting and Processing of Operations Information, and 10 CFR 830.350, Occurrence Reporting and Processing of Operations Information (when it becomes effective), along with this manual, set forth occurrence reporting requirements for Department of Energy (DOE) Departmental Elements and contractors responsible for the management and operation of DOE-owned and -leased facilities. These requirements include categorization of occurrences related to safety, security, environment, health, or operations (''Reportable Occurrences''); DOE notification of these occurrences; and the development and submission of documented follow-up reports. This Manual provides detailed information for categorizing and reporting occurrences at DOE facilities. Information gathered by the Occurrence Reporting and processing System is used for analysis of the Department's performance in environmental protection, safeguards and security, and safety and health of its workers and the public. This information is also used to develop lessons learned and document events that significantly impact DOE operations

  9. Fog Computing: An Overview of Big IoT Data Analytics

    Directory of Open Access Journals (Sweden)

    Muhammad Rizwan Anawar

    2018-01-01

    Full Text Available A huge amount of data, generated by Internet of Things (IoT, is growing up exponentially based on nonstop operational states. Those IoT devices are generating an avalanche of information that is disruptive for predictable data processing and analytics functionality, which is perfectly handled by the cloud before explosion growth of IoT. Fog computing structure confronts those disruptions, with powerful complement functionality of cloud framework, based on deployment of micro clouds (fog nodes at proximity edge of data sources. Particularly big IoT data analytics by fog computing structure is on emerging phase and requires extensive research to produce more proficient knowledge and smart decisions. This survey summarizes the fog challenges and opportunities in the context of big IoT data analytics on fog networking. In addition, it emphasizes that the key characteristics in some proposed research works make the fog computing a suitable platform for new proliferating IoT devices, services, and applications. Most significant fog applications (e.g., health care monitoring, smart cities, connected vehicles, and smart grid will be discussed here to create a well-organized green computing paradigm to support the next generation of IoT applications.

  10. Information operation/information warfare modeling and simulation

    OpenAIRE

    Buettner, Raymond

    2000-01-01

    Information Operations have always been a part of warfare. However, this aspect of warfare is having ever-greater importance as forces rely more and more on information as an enabler. Modern information systems make possible very rapid creation, distribution, and utilization of information. These same systems have vulnerabilities that can be exploited by enemy forces. Information force-on-force is important and complex. New tools and procedures are needed for this warfare arena. As these t...

  11. Information Operations And J-3: A Perfect Union

    National Research Council Canada - National Science Library

    Patschke, Gregory

    2004-01-01

    ... on a lack of unity of command and unity of effort as primary catalysts for this failure. They proposed eliminating the IO cell concept and adopting either an IO task force or a specific IO functional component command. I disagree...

  12. Two Word CAMAC I/O module

    International Nuclear Information System (INIS)

    Barker, L.L.

    1981-05-01

    This note describes the 2 Word I/O subsystem and details its operating characteristics. SLAC drawings in the 926-306 series support this device and should be referenced for construction and connection details

  13. Volcanism on Io

    Science.gov (United States)

    Davies, Ashley Gerard

    2014-03-01

    Preface; Introduction; Part I. Io, 1610 to 1995: Galileo to Galileo: 1. Io, 1610-1979; 2. Between Voyager and Galileo: 1979-95; 3. Galileo at Io; Part II. Planetary Volcanism: Evolution and Composition: 4. Io and Earth: formation, evolution, and interior structure; 5. Magmas and volatiles; Part III. Observing and Modeling Volcanic Activity: 6. Observations: thermal remote sensing of volcanic activity; 7. Models of effusive eruption processes; 8. Thermal evolution of volcanic eruptions; Part IV. Galileo at Io: the Volcanic Bestiary: 9. The view from Galileo; 10. The lava lake at Pele; 11. Pillan and Tvashtar: lava fountains and flows; 12. Prometheus and Amirani: Effusive activity and insulated flows; 13. Loki Patera: Io's powerhouse; 14. Other volcanoes and eruptions; Part V. Volcanism on Io: The Global View: 15. Geomorphology: paterae, shields, flows and mountains; 16. Volcanic plumes; 17. Hot spots; Part VI. Io after Galileo: 18. Volcanism on Io: a post-Galileo view; 19. The future of Io observations; Appendix 1; Appendix 2; References; Index.

  14. Radiation Hardened High Speed Integrated Circuits Double Data Rate I/O for Extreme Operating Environments, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Manned and robotic space missions require high-performance electronic control systems capable of operating for extended periods in harsh environments that are...

  15. Reactor Operations informal monthly report December 1994

    International Nuclear Information System (INIS)

    1994-12-01

    Reactor operations at the MRR and HFBR reactors at Brookhaven National Laboratory are presented for December 1994. Reactor run-time and power levels, instrumentation, mechanical maintenance, occurrence reports, and safety information are included

  16. Laboratory Information Systems Management and Operations.

    Science.gov (United States)

    Cucoranu, Ioan C

    2015-06-01

    The main mission of a laboratory information system (LIS) is to manage workflow and deliver accurate results for clinical management. Successful selection and implementation of an anatomic pathology LIS is not complete unless it is complemented by specialized information technology support and maintenance. LIS is required to remain continuously operational with minimal or no downtime and the LIS team has to ensure that all operations are compliant with the mandated rules and regulations. Copyright © 2015 Elsevier Inc. All rights reserved.

  17. Construction Operations Building Information Exchange (COBIE)

    Science.gov (United States)

    2007-06-01

    Swalley U.S. Department of State, Overseas Buildings Operations Toby Wilson U.S. Army, Corps of Engineers, Engineer R&D Center Jeff Wix AEC3 The...exchanged in COBIE. To map those information exchanges to the IFC model, the Information Delivery Manual (IDM) process [ Wix 2007] was also used. The...Folksonomy. Wikimedia Foundation. http://en.wikipedia.org/wiki/Folksonomy/, accessed 3 August 2007. Wix , Jeffrey. 2007. Information Delivery Manual

  18. IoT-Based Smart Garbage System for Efficient Food Waste Management

    Directory of Open Access Journals (Sweden)

    Insung Hong

    2014-01-01

    Full Text Available Owing to a paradigm shift toward Internet of Things (IoT, researches into IoT services have been conducted in a wide range of fields. As a major application field of IoT, waste management has become one such issue. The absence of efficient waste management has caused serious environmental problems and cost issues. Therefore, in this paper, an IoT-based smart garbage system (SGS is proposed to reduce the amount of food waste. In an SGS, battery-based smart garbage bins (SGBs exchange information with each other using wireless mesh networks, and a router and server collect and analyze the information for service provisioning. Furthermore, the SGS includes various IoT techniques considering user convenience and increases the battery lifetime through two types of energy-efficient operations of the SGBs: stand-alone operation and cooperation-based operation. The proposed SGS had been operated as a pilot project in Gangnam district, Seoul, Republic of Korea, for a one-year period. The experiment showed that the average amount of food waste could be reduced by 33%.

  19. IoT-based smart garbage system for efficient food waste management.

    Science.gov (United States)

    Hong, Insung; Park, Sunghoi; Lee, Beomseok; Lee, Jaekeun; Jeong, Daebeom; Park, Sehyun

    2014-01-01

    Owing to a paradigm shift toward Internet of Things (IoT), researches into IoT services have been conducted in a wide range of fields. As a major application field of IoT, waste management has become one such issue. The absence of efficient waste management has caused serious environmental problems and cost issues. Therefore, in this paper, an IoT-based smart garbage system (SGS) is proposed to reduce the amount of food waste. In an SGS, battery-based smart garbage bins (SGBs) exchange information with each other using wireless mesh networks, and a router and server collect and analyze the information for service provisioning. Furthermore, the SGS includes various IoT techniques considering user convenience and increases the battery lifetime through two types of energy-efficient operations of the SGBs: stand-alone operation and cooperation-based operation. The proposed SGS had been operated as a pilot project in Gangnam district, Seoul, Republic of Korea, for a one-year period. The experiment showed that the average amount of food waste could be reduced by 33%.

  20. IoT-Based Smart Garbage System for Efficient Food Waste Management

    Science.gov (United States)

    Lee, Jaekeun

    2014-01-01

    Owing to a paradigm shift toward Internet of Things (IoT), researches into IoT services have been conducted in a wide range of fields. As a major application field of IoT, waste management has become one such issue. The absence of efficient waste management has caused serious environmental problems and cost issues. Therefore, in this paper, an IoT-based smart garbage system (SGS) is proposed to reduce the amount of food waste. In an SGS, battery-based smart garbage bins (SGBs) exchange information with each other using wireless mesh networks, and a router and server collect and analyze the information for service provisioning. Furthermore, the SGS includes various IoT techniques considering user convenience and increases the battery lifetime through two types of energy-efficient operations of the SGBs: stand-alone operation and cooperation-based operation. The proposed SGS had been operated as a pilot project in Gangnam district, Seoul, Republic of Korea, for a one-year period. The experiment showed that the average amount of food waste could be reduced by 33%. PMID:25258730

  1. Zabezpečení platformy iOS

    OpenAIRE

    Nidl, Michal

    2014-01-01

    This bachelor's thesis is focused on security of operating system iOS from Apple. The thesis is divided into six chapters. The first chapter describes iOS and Apple company. The second chapter deals with iOS security architecture in terms of security model and security mechanisms. The third chapter deals with the security of iOS applications and options of their testing. The fourth chapter describes software attacks against iOS in the form of malware and exploitation. The fifth chapter descri...

  2. Diabetes Applications for Arabic Speakers: A Critical Review of Available Apps for Android and iOS Operated Smartphones.

    Science.gov (United States)

    Alhuwail, Dari

    2016-01-01

    Today, 415 million adults have diabetes; more than 35 million of diabetic adults live in the Middle East and North Africa region. Smartphone penetration in the region is high and applications, or apps, for diabetics have shown promising results in recent years. This study took place between September and December 2015 and reviewed all currently available smartphone diabetes apps for Arabic speakers in both the Apple App and Google Play stores. There were only few diabetes apps for Arabic speakers; only eighteen apps were discovered and considered for this study. Most apps were informational. Only three apps offered utilities such as glucose reading conversion. The apps had issues related to information quality and adherence to latest evidence-based medical advice. There is a need for more evidence-based Arabic diabetes apps with improved functionality. Future research of Arabic diabetes apps should also focus on the involvement and engagement of the patients in the design of these apps.

  3. Volcanic features of Io

    International Nuclear Information System (INIS)

    Carr, M.H.; Masursky, H.; Strom, R.G.; Terrile, R.J.

    1979-01-01

    The volcanic features of Io as detected during the Voyager mission are discussed. The volcanic activity is apparently higher than on any other body in the Solar System. Its volcanic landforms are compared with features on Earth to indicate the type of volcanism present on Io. (U.K.)

  4. Strategy Planning Visualization Tool (SPVT) for the Air Operations Center (AOC). Volume 2: Information Operations (IO) Planning Enhancements

    Science.gov (United States)

    2009-12-31

    NET di rectly bonds i t t o Microsoft Windows machines only, immediately el iminating the possibility of por ting the software t o o ther...requirement to work with OPSWARE and be DoDIIS compliant was to be callable as a “command file” no user interaction installer. IOPC-X leveraged

  5. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations.

    Science.gov (United States)

    Nieto, Ana; Rios, Ruben; Lopez, Javier

    2018-02-07

    IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases.

  6. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations

    Directory of Open Access Journals (Sweden)

    Ana Nieto

    2018-02-01

    Full Text Available IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases.

  7. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations

    Science.gov (United States)

    Lopez, Javier

    2018-01-01

    IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases. PMID:29414864

  8. Modeling decisions information fusion and aggregation operators

    CERN Document Server

    Torra, Vicenc

    2007-01-01

    Information fusion techniques and aggregation operators produce the most comprehensive, specific datum about an entity using data supplied from different sources, thus enabling us to reduce noise, increase accuracy, summarize and extract information, and make decisions. These techniques are applied in fields such as economics, biology and education, while in computer science they are particularly used in fields such as knowledge-based systems, robotics, and data mining. This book covers the underlying science and application issues related to aggregation operators, focusing on tools used in practical applications that involve numerical information. Starting with detailed introductions to information fusion and integration, measurement and probability theory, fuzzy sets, and functional equations, the authors then cover the following topics in detail: synthesis of judgements, fuzzy measures, weighted means and fuzzy integrals, indices and evaluation methods, model selection, and parameter extraction. The method...

  9. Using Formal Grammars to Predict I/O Behaviors in HPC: The Omnisc'IO Approach

    Energy Technology Data Exchange (ETDEWEB)

    Dorier, Matthieu; Ibrahim, Shadi; Antoniu, Gabriel; Ross, Rob

    2016-08-01

    The increasing gap between the computation performance of post-petascale machines and the performance of their I/O subsystem has motivated many I/O optimizations including prefetching, caching, and scheduling. In order to further improve these techniques, modeling and predicting spatial and temporal I/O patterns of HPC applications as they run has become crucial. In this paper we present Omnisc'IO, an approach that builds a grammar-based model of the I/O behavior of HPC applications and uses it to predict when future I/O operations will occur, and where and how much data will be accessed. To infer grammars, Omnisc'IO is based on StarSequitur, a novel algorithm extending Nevill-Manning's Sequitur algorithm. Omnisc'IO is transparently integrated into the POSIX and MPI I/O stacks and does not require any modification in applications or higher-level I/O libraries. It works without any prior knowledge of the application and converges to accurate predictions of any N future I/O operations within a couple of iterations. Its implementation is efficient in both computation time and memory footprint.

  10. Intelligence system for reactor operator informational support

    International Nuclear Information System (INIS)

    Prangishvili, I.V.; Pashchenko, F.F.; Saprykin, E.M.

    1989-01-01

    Problems related to creation and introduction at NPP of highly efficient and reliable systems for monitoring and control of working processes and intelligence-endowed systems of operator informational support (ISOIS) are considered. The main units included in ISOIS are considered. The main units included in ISOIS are described. The unit of current state monitoring provides information for the operator, which is necessary under concrete conditions for the process monitoring and control, so as to avoid emergencies and affers a program of actions in a dialogue mode for the operator. The identification unit is designed for the obtaining of assessed values of process parameters (neutron fields, temperatures, pressures) and basic equipment (reactivity coefficients, fuel rod weights, time of delay). The prediction unit evaluates the behaviour of process parameters and process state in various situations. 9 refs

  11. Road to Io

    International Nuclear Information System (INIS)

    Chang, T.

    1989-01-01

    The potential study of Io by the Galileo mission is discussed. The mission, which is scheduled for launch from the Space Shuttle in 1989, is expected to fly 20 to 100 times closer to the Galilean moons of Jupiter than the Voyager missions. Topics which the mission hopes to address include volcanism, tidal forces and continental drift on Io, and the torus of charged particles that accompanies Io on its orbit of Jupiter. The Venus-earth-earth gravity assist route of the mission and the NIR mapping spectrometer aboard Galileo are considered

  12. Io after Galileo

    International Nuclear Information System (INIS)

    Lopes, Rosaly M C; Williams, David A

    2005-01-01

    Io, the volcanically active innermost large moon of Jupiter, was a target of intense study during the recently completed NASA Galileo mission to Jupiter (1989-2003). Galileo's suite of instruments obtained unprecedented observations of Io, including high spatial resolution imaging in the visible and infrared. This paper reviews the insights gained about Io's surface, atmosphere and space environment during the Galileo mission. Io is thought to have a large Fe-FeS core, whose radius is slightly less than half the radius of Io and whose mass is 20% of the moon. The lack of an intrinsic magnetic field implies that the core is either completely solid or completely liquid. The mantle of Io appears to undergo a high degree of partial melting (20-50% molten) that produces ultramafic lavas dominated by Mg-rich orthopyroxene in an apparent 'mushy magma ocean', suggesting an undifferentiated mantle. The crust of Io is thought to be rigid, 20-30 km thick, cold away from volcanic heat sources and composed of mafic to ultramafic silicates. Tidal flexing due to Io's orbital resonance produces ∼100 m tides at the surface, generating heat that powers Io's volcanism. Silicate volcanism appears to be dominant at most hot spots, although secondary sulfur volcanism may be important in some areas. The key discoveries of the Galileo era at Io were: (1) the detection of high-temperature volcanism (ultramafic, superheated mafic or 'ceramic'); (2) the detection of both S 2 and SO 2 gas in Ionian plumes; (3) the distinction between eruption styles, including between Pelean plumes (originating from central vents) and Promethean plumes (originating from silicate lava flow fronts); (4) the relationship between mountains and paterae, which indicates that many paterae are formed as magma preferentially ascends along tectonic faults associated with mountain building; (5) the lack of detection of an intrinsic magnetic field; (6) a new estimate of global heat flow; and (7) increased understanding

  13. Building IoT Applications with Raspberry Pi and Low Power IQRF Communication Modules

    Directory of Open Access Journals (Sweden)

    Isidro Calvo

    2016-09-01

    Full Text Available Typical Internet of Things (IoT applications involve collecting information automatically from diverse geographically-distributed smart sensors and concentrating the information into more powerful computers. The Raspberry Pi platform has become a very interesting choice for IoT applications for several reasons: (1 good computing power/cost ratio; (2 high availability; it has become a de facto hardware standard; and (3 ease of use; it is based on operating systems with a big community of users. In IoT applications, data are frequently carried by means of wireless sensor networks in which energy consumption is a key issue. Energy consumption is especially relevant for smart sensors that are scattered over wide geographical areas and may need to work unattended on batteries for long intervals of time. In this scenario, it is convenient to ease the construction of IoT applications while keeping energy consumption to a minimum at the sensors. This work proposes a possible gateway implementation with specific technologies. It solves the following research question: how to build gateways for IoT applications with Raspberry Pi and low power IQRF communication modules. The following contributions are presented: (1 one architecture for IoT gateways that integrates data from sensor nodes into a higher level application based on low-cost/low-energy technologies; (2 bindings in Java and C that ease the construction of IoT applications; (3 an empirical model that describes the consumption of the communications at the nodes (smart sensors and allows scaling their batteries; and (4 validation of the proposed energy model at the battery-operated nodes.

  14. A Federated Capability-based Access Control Mechanism for Internet of Things (IoTs)

    OpenAIRE

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-01-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, l...

  15. Exploring of Wireless Technology to Provide Information Sharing Among Military, United Nations and Civilian Organizations During Complex Humanitarian Emergencies and Peacekeeping Operations

    National Research Council Canada - National Science Library

    Bridges, Douglas

    2003-01-01

    ...) and peacekeeping operations. Humanitarian emergencies and peacekeeping operations are a complex mix of related activities that require the combined efforts of the UN, military, International Organizations (IOs...

  16. IoT Contextual Factors on Healthcare.

    Science.gov (United States)

    Michalakis, Konstantinos; Caridakis, George

    2017-01-01

    With the emergence of the Internet of Things, new services in healthcare will be available and existing systems will be integrated in the IoT framework, providing automated medical supervision and efficient medical treatment. Context awareness plays a critical role in realizing the vision of the IoT, providing rich contextual information that can help the system act more efficiently. Since context in healthcare has its unique characteristics, it is necessary to define an appropriate context aware framework for healthcare IoT applications. We identify this context as perceived in healthcare applications and describe the context aware procedures. We also present an architecture that connects the sensors that measure biometric data with the sensory networks of the environment and the various IoT middleware that reside in the geographical area. Finally, we discuss the challenges for the realization of this vision.

  17. IOs as Social Sites

    DEFF Research Database (Denmark)

    Park, Susan M.; Vetterlein, Antje

    Norms research has made significant inroads into examining their emergence and influence in international relations, while recognizing international organizations (IOs) as key social sites for norms to be created and/or disseminated. This paper interrogates how IOs as “organizational platforms......” (Finnemore 1996) influence the norm building process. Going beyond state-centric approaches to norm construction, it argues that the process of taking up a norm by an IO does affect the norm’s power. A norm’s strength is determined by the extent to which it is uncontested and taken for granted as appropriate...... the norm building process in this way provides insight into the effect of IOs as social sites in strengthening a norm....

  18. Development of the operational information processing platform

    International Nuclear Information System (INIS)

    Shin, Hyun Kook; Park, Jeong Seok; Baek, Seung Min; Kim, Young Jin; Joo, Jae Yoon; Lee, Sang Mok; Jeong, Young Woo; Seo, Ho Jun; Kim, Do Youn; Lee, Tae Hoon

    1996-02-01

    The Operational Information Processing Platform(OIPP) is platform system which was designed to provide the development and operation environments for plant operation and plant monitoring. It is based on the Plant Computer Systems (PCS) of Yonggwang 3 and 4, Ulchin 3 and 4, and Yonggwang 5 and 6 Nuclear Power Plants (NPP). The UNIX based workstation, real time kernel and graphics design tool are selected and installed through the reviewing the function of PCS. In order to construct the development environment for open system architecture and distributed computer system, open computer system architecture was adapted both in hardware and software. For verification of system design and evaluation of technical methodologies, the PCS running under the OIPP is being designed and implemented. In this system, the man-machine interface and system functions are being designed and implemented to evaluate the differences between the UCN 3, 4 PCS and OIPP. 15 tabs., 32 figs., 11 refs. (Author)

  19. Standardizing the information architecture for spacecraft operations

    Science.gov (United States)

    Easton, C. R.

    1994-01-01

    This paper presents an information architecture developed for the Space Station Freedom as a model from which to derive an information architecture standard for advanced spacecraft. The information architecture provides a way of making information available across a program, and among programs, assuming that the information will be in a variety of local formats, structures and representations. It provides a format that can be expanded to define all of the physical and logical elements that make up a program, add definitions as required, and import definitions from prior programs to a new program. It allows a spacecraft and its control center to work in different representations and formats, with the potential for supporting existing spacecraft from new control centers. It supports a common view of data and control of all spacecraft, regardless of their own internal view of their data and control characteristics, and of their communications standards, protocols and formats. This information architecture is central to standardizing spacecraft operations, in that it provides a basis for information transfer and translation, such that diverse spacecraft can be monitored and controlled in a common way.

  20. IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations

    OpenAIRE

    Ana Nieto; Ruben Rios; Javier Lopez

    2018-01-01

    IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntar...

  1. Organizing for Information Operations Within The Joint Task Force

    National Research Council Canada - National Science Library

    McLaughlin, Lawrence

    2003-01-01

    .... Joint doctrine defines information operations as a broad range of capabilities and related activities that include operations security, psychological operations, electronic warfare, physical attack...

  2. Crafting a Usable Microkernel, Processor, and I/O System with Strict and Provable Information Flow Security

    Science.gov (United States)

    2011-01-01

    OS level, Flume [22] has even been shown to be information flow secure through abstractions such as processes, pipes, file systems etc, while seL4 ...Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood. sel4 : formal verification of an

  3. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes

    Directory of Open Access Journals (Sweden)

    Bako Ali

    2018-03-01

    Full Text Available The Internet of Things (IoT is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.

  4. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes

    Science.gov (United States)

    2018-01-01

    The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes. PMID:29518023

  5. Benchmarking Distributed Stream Processing Platforms for IoT Applications

    OpenAIRE

    Shukla, Anshu; Simmhan, Yogesh

    2016-01-01

    Internet of Things (IoT) is a technology paradigm where millions of sensors monitor, and help inform or manage, physical, envi- ronmental and human systems in real-time. The inherent closed-loop re- sponsiveness and decision making of IoT applications makes them ideal candidates for using low latency and scalable stream processing plat- forms. Distributed Stream Processing Systems (DSPS) are becoming es- sential components of any IoT stack, but the efficacy and performance of contemporary DSP...

  6. 77 FR 7243 - Proposed Information Collection (Operation Enduring Freedom/Operation Iraqi Freedom Veterans...

    Science.gov (United States)

    2012-02-10

    ... DEPARTMENT OF VETERANS AFFAIRS [OMB Control No. 2900-0728] Proposed Information Collection (Operation Enduring Freedom/ Operation Iraqi Freedom Veterans Health Needs Assessment) Activities Under OMB....'' SUPPLEMENTARY INFORMATION: Title: Operation Enduring Freedom/Operation Iraqi Freedom Veterans Health Needs...

  7. The Linkage of Joint Operational Fires, Information Operations and the Army: Does the Army Have Effective Feedback Mechanisms that Integrate Operational Fires (Physical Destruction) and Information Operations?

    National Research Council Canada - National Science Library

    Mills, Charles

    2004-01-01

    The information revolution seems to hold a lot of promise to the U.S. economy and the U.S. military, but rigid bureaucratic hierarchies make it extremely difficult for effective integration of operational fires and information operations...

  8. I/O Performance Characterization of Lustre and NASA Applications on Pleiades

    Science.gov (United States)

    Saini, Subhash; Rappleye, Jason; Chang, Johnny; Barker, David Peter; Biswas, Rupak; Mehrotra, Piyush

    2012-01-01

    In this paper we study the performance of the Lustre file system using five scientific and engineering applications representative of NASA workload on large-scale supercomputing systems such as NASA s Pleiades. In order to facilitate the collection of Lustre performance metrics, we have developed a software tool that exports a wide variety of client and server-side metrics using SGI's Performance Co-Pilot (PCP), and generates a human readable report on key metrics at the end of a batch job. These performance metrics are (a) amount of data read and written, (b) number of files opened and closed, and (c) remote procedure call (RPC) size distribution (4 KB to 1024 KB, in powers of 2) for I/O operations. RPC size distribution measures the efficiency of the Lustre client and can pinpoint problems such as small write sizes, disk fragmentation, etc. These extracted statistics are useful in determining the I/O pattern of the application and can assist in identifying possible improvements for users applications. Information on the number of file operations enables a scientist to optimize the I/O performance of their applications. Amount of I/O data helps users choose the optimal stripe size and stripe count to enhance I/O performance. In this paper, we demonstrate the usefulness of this tool on Pleiades for five production quality NASA scientific and engineering applications. We compare the latency of read and write operations under Lustre to that with NFS by tracing system calls and signals. We also investigate the read and write policies and study the effect of page cache size on I/O operations. We examine the performance impact of Lustre stripe size and stripe count along with performance evaluation of file per process and single shared file accessed by all the processes for NASA workload using parameterized IOR benchmark.

  9. The Challenge of New and Emerging Information Operations

    National Research Council Canada - National Science Library

    Heath, James E; Woodcock, Alexander E

    1999-01-01

    Information operations as defined in Joint Publication 3-13 of the Joint Staff (1998) are aimed at influencing the information and information systems of an adversary and defending one's own information and information systems...

  10. Using a layered model to place EW in context within the information sphere

    CSIR Research Space (South Africa)

    Maasdorp, FDV

    2012-11-01

    Full Text Available In recent years, a discussion on the relationship between Electronic Warfare (EW), Information Warfare (IW), Cyber Operations, Net-Centric Warfare, Command and Control, Information Operations (IO) and other constructs have emerged. This paper...

  11. Nanosatellites constellation as an IoT communication platform for near equatorial countries

    Science.gov (United States)

    Narayanasamy, A.; Ahmad, Y. A.; Othman, M.

    2017-11-01

    Anytime, anywhere access for real-time intelligence by Internet of Things (IoT) is changing the way that the whole world will operate as it moves toward data driven technologies. Over the next five years, IoT related devices going to have a dramatic breakthrough in current and new applications, not just on increased efficiency and cost reduction on current system, but it also will make trillion-dollar revenue generation and improve customer satisfaction. IoT communications is the networking of intelligent devices which enables data collection from remote assets. It covers a broad range of technologies and applications which connect to the physical world while allowing key information to be transferred automatically. The current terrestrial wireless communications technologies used to enable this connectivity include GSM, GPRS, 3G, LTE, WIFI, WiMAX and LoRa. These connections occur short to medium range distance however, none of them can cover a whole country or continent and the networks are getting congested with the multiplication of IoT devices. In this study, we discuss a conceptual design of a nanosatellite constellation those can provide a space-based communication platform for IoT devices for near Equatorial countries. The constellation design i.e. the orbital plane and number of satellites and launch deployment concepts are presented.

  12. Object‐Oriented RFID with IoT: A Design Concept of  Information Systems in Manufacturing

    Directory of Open Access Journals (Sweden)

    Tamotsu Kamigaki

    2017-02-01

    Full Text Available The Internet of Things (IoT has increasingly become important in industry. Connectivity  over the internet of not only people but also devices (such as sensors, appliances, machines, robots,  and vehicles is leading to a paradigm shift in manufacturing. The Japanese government recognizes  this and has stated that IoT connectivity and the methodologies to exploit it are paramount for  Japanese  industry.  Currently,  the  necessary  changes  have  been  realized  in  large  Japanese  companies;  however,  implementation  in  smaller  companies  has  been  lagging,  despite  the  advantages of introducing IoT technologies, due to the high cost. The objective of this research is to  suggest a design concept which combines IoT and object‐oriented radio frequency identification  (RFID.  IoT technology is  used for  collecting, analyzing, and managing data, and an object‐oriented  RFID  system  is used  as a control  process in manufacturing  systems.  In previous research,  the objectoriented  RFID system  was shown to provide  flexible management through the use of a variety of  OORFID tags. The current research extends this by introducing object‐oriented RFID into IoT  systems to  improve  the  flexibility  in the  manufacturing systems. For the verification of this concept,  an experimental IoT system using object‐oriented  RFID was  designed  and  implemented

  13. IoT: Their Conveniences, Security Challenges and Possible Solutions

    Directory of Open Access Journals (Sweden)

    Davar Pishva

    2017-07-01

    Full Text Available The build-in internet-controlled functions of smart devices such as smart phone, smart television, home healthcare gadget, etc., have made them quite attractive to many segments of consumers. In recent years mankind has witnessed an upsurge usage of such devices for numerous purposes. In this paper, the author is going to show how previously forecasted security challenges of these devices are becoming realities in the present day life. The paper initially provides some introductory information about the topic, mostly by means of survey and citations of previous work. It then highlights the devastating effects of October 21, 2016 DDoS attack which mainly utilized IoT devices. It emphasizes the danger of recently revealed Mirai IoT botnet which serves as the basis for the DDoS-for-hire ‘booter’/ ‘stresser’ service. In terms of counter measures, after highlighting IoT security implementation challenges, numerous approaches are presented. As a long-term solution, an architecture wherein security issues are managed through universal home gateway by network operators in a product based fashion is emphasized. The author shows its technical feasibility and demonstrates its partial materialization in proprietary manners. It then explains why and how numerous stake holders are needed to get together for its wide range commercial implementation. Some immediate necessary safeguard actions and intermediate schemes which include soft infrastructures are also presented for the purpose of risk reduction.

  14. iOS application security analysis

    OpenAIRE

    Βλάχος, Κωνσταντίνος Γ.; Vlachos, Konstantinos G.

    2017-01-01

    The purpose of this research is to explain the nature of the Apple iOS applications and provide all the available Open Source tools for analyzing them, starting from decrypting any application’s binary downloaded from the AppStore to reverse engineering it and even altering the flow of its running process on the actual device. We start introducing the basic theory of the iOS operating system and its applications including the security mechanisms incorporated by Apple that are a...

  15. An Eruption on Io

    Science.gov (United States)

    2007-01-01

    The first images returned to Earth by New Horizons during its close encounter with Jupiter feature the Galilean moon Io, snapped with the Long Range Reconnaissance Imager (LORRI) at 0840 UTC on February 26, while the moon was 2.5 million miles (4 million kilometers) from the spacecraft. Io is intensely heated by its tidal interaction with Jupiter and is thus extremely volcanically active. That activity is evident in these images, which reveal an enormous dust plume, more than 150 miles high, erupting from the volcano Tvashtar. The plume appears as an umbrella-shaped feature of the edge of Io's disk in the 11 o'clock position in the right image, which is a long-exposure (20-millisecond) frame designed specifically to look for plumes like this. The bright spots at 2 o'clock are high mountains catching the setting sun; beyond them the night side of Io can be seen, faintly illuminated by light reflected from Jupiter itself. The left image is a shorter exposure -- 3 milliseconds -- designed to look at surface features. In this frame, the Tvashtar volcano shows as a dark spot, also at 11 o'clock, surrounded by a large dark ring, where an area larger than Texas has been covered by fallout from the giant eruption. This is the clearest view yet of a plume from Tvashtar, one of Io's most active volcanoes. Ground-based telescopes and the Galileo Jupiter orbiter first spotted volcanic heat radiation from Tvashtar in November 1999, and the Cassini spacecraft saw a large plume when it flew past Jupiter in December 2000. The Keck telescope in Hawaii picked up renewed heat radiation from Tvashtar in spring 2006, and just two weeks ago the Hubble Space Telescope saw the Tvashtar plume in ultraviolet images designed to support the New Horizons flyby. Most of those images will be stored onboard the spacecraft for downlink to Earth in March and April.

  16. 76 FR 58565 - Proposed Information Collection (Operation Enduring Freedom/Operation Iraqi Freedom Seriously...

    Science.gov (United States)

    2011-09-21

    ... (Operation Enduring Freedom/ Operation Iraqi Freedom Seriously Injured/Ill Service Member Veteran Worksheet... solicits comments on information provided to Operation Enduring Freedom/Operation Iraqi Freedom veterans... information technology. Title: Operation Enduring Freedom/Operation Iraqi Freedom Seriously Injured/Ill...

  17. Review on open source operating systems for internet of things

    Science.gov (United States)

    Wang, Zhengmin; Li, Wei; Dong, Huiliang

    2017-08-01

    Internet of Things (IoT) is an environment in which everywhere and every device became smart in a smart world. Internet of Things is growing vastly; it is an integrated system of uniquely identifiable communicating devices which exchange information in a connected network to provide extensive services. IoT devices have very limited memory, computational power, and power supply. Traditional operating systems (OS) have no way to meet the needs of IoT systems. In this paper, we thus analyze the challenges of IoT OS and survey applicable open source OSs.

  18. IoT gateway architecture

    OpenAIRE

    Leleika, Paulius

    2017-01-01

    This paper provides an overview of HTTP, CoAP, AMQP, DDS, MQTT, XMPP communication protocols. The main IoT problem is that IoT devices uses many different communication protocols and devices cannot communicate with each other directly. IoT gateway helps to solve that problem. This paper also identifies requirements for IoT gateway software. Provides solution for communication between devices which are using different messaging architectures. Presents security aspects and ways to secure IoT ga...

  19. iOS app development portable genius

    CERN Document Server

    Wentk, Richard

    2012-01-01

    The essential skills and technologies needed for iOS development in one handy guide! The unprecedented popularity of iOS devices, such as the iPhone, iPad, and iPod touch, has led to a development boom. If you’re eager to become part of the action, then this is the book for you! Packed with must-have information on iOS development, this handy guide covers Objective-C, Xcode, Frameworks, and sound design principles and explains how to upload an app to the app store and integrate apps with the latest advances that Apple offers developers. The featured tips and tricks will get you up and ru

  20. Commercial Air Carrier Vulnerabilities to Information Operations

    National Research Council Canada - National Science Library

    Shelburn, Bryan H

    2002-01-01

    .... The increasing dependence of government and industry on information technology has created critical vulnerabilities that can be exploited by degrading or destroying the use of information systems...

  1. Future of IoT Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Suk Kyu Lee

    2017-10-01

    Full Text Available The introduction of mobile devices has changed our daily lives. They enable users to obtain information even in a nomadic environment and provide information without limitations. A decade after the introduction of this technology, we are now facing the next innovation that will change our daily lives. With the introduction of the Internet of Things (IoT, our communication ability will not be restricted to only mobile devices. Rather, it will expand to all things with which we coexist. Many studies have discussed IoT-related services and platforms. However, there are only limited discussions about the IoT network. In this paper, we will thoroughly analyze the technical details about the IoT network. Based on our survey of papers, we will provide insight about the future IoT network and the crucial components that will enable it.

  2. IoT for Smart Living

    Indian Academy of Sciences (India)

    Professor. Robert Bosch Centre for Cyber-Physical Systems, ... Develop Information models/Knowledge structures to capture “Cities” to enable Intelligent apps. IoT Technology is now easily accessible for anyone to experiment with. Build very ...

  3. IO and OI. II

    DEFF Research Database (Denmark)

    Engelfriet, Joost; Schmidt, Erik Meineche

    1978-01-01

    In Part 1 of this paper (J. Comput. System Sci. 15, Number 3 (1977)) we presented a fixed point characterization of the (IO and OI) context-free tree languages. We showed that a context-free tree grammar can be viewed as a system of regular equations over a tree language substitution algebra. In ....... In this part we shall use these results to obtain a theory of systems of context-free equations over arbitrary continuous algebras. We refer to the Introduction of Part 1 for a description of the contents of this part.......In Part 1 of this paper (J. Comput. System Sci. 15, Number 3 (1977)) we presented a fixed point characterization of the (IO and OI) context-free tree languages. We showed that a context-free tree grammar can be viewed as a system of regular equations over a tree language substitution algebra...

  4. Remote I/O : fast access to distant storage.

    Energy Technology Data Exchange (ETDEWEB)

    Foster, I.; Kohr, D., Jr.; Krishnaiyer, R.; Mogill, J.

    1997-12-17

    As high-speed networks make it easier to use distributed resources, it becomes increasingly common that applications and their data are not colocated. Users have traditionally addressed this problem by manually staging data to and from remote computers. We argue instead for a new remote I/O paradigm in which programs use familiar parallel I/O interfaces to access remote file systems. In addition to simplifying remote execution, remote I/O can improve performance relative to staging by overlapping computation and data transfer or by reducing communication requirements. However, remote I/O also introduces new technical challenges in the areas of portability, performance, and integration with distributed computing systems. We propose techniques designed to address these challenges and describe a remote I/O library called RIO that we have developed to evaluate the effectiveness of these techniques. RIO addresses issues of portability by adopting the quasi-standard MPI-IO interface and by defining a RIO device and RIO server within the ADIO abstract I/O device architecture. It addresses performance issues by providing traditional I/O optimizations such as asynchronous operations and through implementation techniques such as buffering and message forwarding to off load communication overheads. RIO uses the Nexus communication library to obtain access to configuration and security mechanisms provided by the Globus wide area computing tool kit. Microbenchmarks and application experiments demonstrate that our techniques achieve acceptable performance in most situations and can improve turnaround time relative to staging.

  5. 76 FR 73022 - Agency Information Collection (Operation Enduring Freedom/Operation Iraqi Freedom Seriously...

    Science.gov (United States)

    2011-11-28

    ... (Operation Enduring Freedom/ Operation Iraqi Freedom Seriously Injured/Ill Service Member Veteran Worksheet... No. 2900-0720.'' SUPPLEMENTARY INFORMATION: Title: Operation Enduring Freedom/Operation Iraqi Freedom... used VA Form 21-0773 as a checklist to ensure they provided Operation Enduring Freedom or Operation...

  6. Commercial Air Carrier Vulnerabilities to Information Operations

    National Research Council Canada - National Science Library

    Shelburn, Bryan H

    2002-01-01

    .... Among those elements susceptible to these vulnerabilities are the operations of commercial air carriers that are essential to the military's ability to wage war and project power wherever needed in the world...

  7. Green IoT: An Investigation on Energy Saving Practices for 2020 and Beyond

    OpenAIRE

    Arshad, R.; Zahoor, S.; Shah, M.A.; Wahid, A.; Yu, Hongnian

    2017-01-01

    Internet of Things (IoT) is an emerging concept which aims to connect billions of devices with each other. The IoT devices sense, collect and transmit important information from their surroundings. This exchange of very large amount of information amongst billions of devices creates a massive energy need. Green IoT envisions the concept of reducing the energy consumption of IoT devices and making the environment safe. Inspired by achieving a sustainable environment for IoT, we first give the ...

  8. Volcanic eruption plumes on Io

    International Nuclear Information System (INIS)

    Strom, R.G.; Terrile, R.J.; Masursky, H.; Hansen, C.

    1979-01-01

    The detection of an umbrella-shaped plume extending about 280 km above the bright limb of Io was one of the most important discoveries made during the Voyager 1 encounter with the jovian system. This discovery proves that Io is volcanically active at present, and the number and magnitude of these eruptions indicate that Io is the most volcanically active body so far discovered in the Solar System. Preliminary analyses of these eruptive plumes are presented. (U.K.)

  9. TMACS I/O termination point listing. Revision 1

    International Nuclear Information System (INIS)

    Scaief, C.C. III.

    1994-01-01

    This document provides a listing of all analog and discrete input/output (I/O) points connected to the Tank Monitor and Control System (TMACS). The list also provides other information such as the point tag name, termination location, description, drawing references and other parameters. The purpose is to define each point's unique tag name and to cross reference the point with other associated information that may be necessary for activities such as maintenance, calibration, diagnostics, or design changes. It provides a list in one document of all I/O points that would otherwise only be available by referring to all I/O termination drawings

  10. TMACS I/O termination point listing. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Scaief, C.C. III

    1994-09-13

    This document provides a listing of all analog and discrete input/output (I/O) points connected to the Tank Monitor and Control System (TMACS). The list also provides other information such as the point tag name, termination location, description, drawing references and other parameters. The purpose is to define each point`s unique tag name and to cross reference the point with other associated information that may be necessary for activities such as maintenance, calibration, diagnostics, or design changes. It provides a list in one document of all I/O points that would otherwise only be available by referring to all I/O termination drawings.

  11. Io Pele plume

    Science.gov (United States)

    2000-01-01

    Voyager 1 took this narrow-angle camera image on 5 March 1979 from a distance of 450,000 kilometers. At this geometry, the camera looks straight down through a volcanic plume at one of Io's most active volcanos, Pele. The large heart-shaped feature is the region where Pele's plume falls to the surface. At the center of the 'heart' is the small dark fissure that is the source of the eruption. The Voyager Project is managed by the Jet Propulsion Laboratory for NASA's Office of Space Science.

  12. Java I/O

    CERN Document Server

    Harold, Elliotte Rusty

    2006-01-01

    All of Java's Input/Output (I/O) facilities are based on streams, which provide simple ways to read and write data of different types. Java provides many different kinds of streams, each with its own application. The universe of streams is divided into four largecategories: input streams and output streams, for reading and writing binary data; and readers and writers, for reading and writing textual (character) data. You're almost certainly familiar with the basic kinds of streams--but did you know that there's a CipherInputStream for reading encrypted data? And a ZipOutputStream for automati

  13. IoT European Large-Scale Pilots – Integration, Experimentation and Testing

    OpenAIRE

    Guillén, Sergio Gustavo; Sala, Pilar; Fico, Giuseppe; Arredondo, Maria Teresa; Cano, Alicia; Posada, Jorge; Gutierrez, Germán; Palau, Carlos; Votis, Konstantinos; Verdouw, Cor N.; Wolfert, Sjaak; Beers, George; Sundmaeker, Harald; Chatzikostas, Grigoris; Ziegler, Sébastien

    2017-01-01

    The IoT European Large-Scale Pilots Programme includes the innovation consortia that are collaborating to foster the deployment of IoT solutions in Europe through the integration of advanced IoT technologies across the value chain, demonstration of multiple IoT applications at scale and in a usage context, and as close as possible to operational conditions. The programme projects are targeted, goal-driven initiatives that propose IoT approaches to specific real-life industrial/societal challe...

  14. OS X and iOS Kernel Programming

    CERN Document Server

    Halvorsen, Ole Henry

    2011-01-01

    OS X and iOS Kernel Programming combines essential operating system and kernel architecture knowledge with a highly practical approach that will help you write effective kernel-level code. You'll learn fundamental concepts such as memory management and thread synchronization, as well as the I/O Kit framework. You'll also learn how to write your own kernel-level extensions, such as device drivers for USB and Thunderbolt devices, including networking, storage and audio drivers. OS X and iOS Kernel Programming provides an incisive and complete introduction to the XNU kernel, which runs iPhones, i

  15. An Intelligent Improvement of Internet-Wide Scan Engine for Fast Discovery of Vulnerable IoT Devices

    Directory of Open Access Journals (Sweden)

    Hwankuk Kim

    2018-05-01

    Full Text Available Since 2016, Mirai and Persirai malware have infected hundreds of thousands of Internet of Things (IoT devices and created a massive IoT botnet, which caused distributed denial of service (DDoS attacks. IoT malware targets vulnerable IoT devices, which are vulnerable to security risks. Techniques are needed to prevent IoT devices from being exploited by attackers. However, unlike high-performance PCs, IoT devices are lightweight, low-power, and low-cost, having performance limitations regarding processing and memory, which makes it difficult to install security and anti-malware programs. Recently, several studies have been attempted to quickly search for vulnerable internet-connected devices to solve this real issue. Issues yet to be studied still exist regarding these types of internet-wide scan technologies, such as filtering by security devices and a shortage of collected operating system (OS information. This paper proposes an intelligent internet-wide scan model that improves IP state scanning with advanced internet protocol (IP randomization, reactive protocol (port scanning, and OS fingerprinting scanning, applying k* algorithm in order to find vulnerable IoT devices. Additionally, we describe the experiment’s results compared to the existing internet-wide scan technologies, such as ZMap and Shodan. As a result, the proposed model experimentally shows improved performance. Although we improved the ZMap, the throughput per minute (TPM performance is similar to ZMap without degrading the IP scan throughput and the performance of generating a single IP address is about 118% better than ZMap. In the protocol scan performance experiments, it is about 129% better than the Censys based ZMap, and the performance of OS fingerprinting is better than ZMap, with about 50% accuracy.

  16. Information Operations: Countering the Asymmetric Threat to the United States

    National Research Council Canada - National Science Library

    McKeown, Wendell

    1999-01-01

    .... The cornerstone of Joint Vision 2010 is information superiority. Every facet of future military operations will be critically linked to an aggregate cyber network that relies on critical national infrastructures to provide for information superiority...

  17. Use of new components in ios5

    OpenAIRE

    Cvenkel, Gašper

    2012-01-01

    Technological development of mobile technology is very fast now days, which contribute to increasing number of smart phones available on the market. Those phones are driven by different operating systems, which are developing, getting new features and upgrades. That is one of the reasons to introduce new features of iOS 5 (iCloud, Storyboard, Notification Center), compare them with competition and present pros and cons. The very rapid development is also reflected by the fact, that it is alre...

  18. OPERATIONS RESEARCH IN THE DESIGN OF MANAGEMENT INFORMATION SYSTEMS

    Science.gov (United States)

    management information systems is concerned with the identification and detailed specification of the information and data processing...of advanced data processing techniques in management information systems today, the close coordination of operations research and data systems activities has become a practical necessity for the modern business firm.... information systems in which mathematical models are employed as the basis for analysis and systems design. Operations research provides a

  19. Pele Plume Deposit on Io

    Science.gov (United States)

    1997-01-01

    The varied effects of Ionian volcanism can be seen in this false color infrared composite image of Io's trailing hemisphere. Low resolution color data from Galileo's first orbit (June, 1996) have been combined with a higher resolution clear filter picture taken on the third orbit (November, 1996) of the spacecraft around Jupiter.A diffuse ring of bright red material encircles Pele, the site of an ongoing, high velocity volcanic eruption. Pele's plume is nearly invisible, except in back-lit photographs, but its deposits indicate energetic ejection of sulfurous materials out to distances more than 600 kilometers from the central vent. Another bright red deposit lies adjacent to Marduk, also a currently active ediface. High temperature hot spots have been detected at both these locations, due to the eruption of molten material in lava flows or lava lakes. Bright red deposits on Io darken and disappear within years or decades of deposition, so the presence of bright red materials marks the sites of recent volcanism.This composite was created from data obtained by the Solid State Imaging (CCD) system aboard NASA's Galileo spacecraft. The region imaged is centered on 15 degrees South, 224 degrees West, and is almost 2400 kilometers across. The finest details that can be discerned in this picture are about 3 kilometers across. North is towards the top of the picture and the sun illuminates the surface from the west.The Jet Propulsion Laboratory, Pasadena, CA manages the mission for NASA's Office of Space Science, Washington, DC.This image and other images and data received from Galileo are posted on the World Wide Web, on the Galileo mission home page at URL http://galileo.jpl.nasa.gov. Background information and educational context for the images can be found at URL http://www.jpl.nasa.gov/galileo/sepo

  20. 5G IoT Industry Verticals and Network Requirements

    OpenAIRE

    Condoluci, Massimo; Lema Rosas, Maria Angel; Mahmoodi, Toktam; Dohler, Michael

    2017-01-01

    The effective provisioning of industry verticals over the next-to-come 5G systems opens novel business opportunities for telco operators especially when considering the integration of Internet of Things (IoT) devices as enablers of business cases based on remote sensing and control. This chapter highlights the main features of IoT verticals with particular attention on healthcare, smart cities, industry automation and entertainment business cases. The aim of this Chapter is to derive the requ...

  1. UCH 3 and 4 plant computer system I/O point summary

    International Nuclear Information System (INIS)

    Sohn, Kwang Young; Lee, Tae Hoon; Lee, Soon Sung; Lee, Byung Chae; Yoon, Jong Keon; Park, Jeong Suk; Baek, Seung Min; Shin, Hyun Kook

    1996-05-01

    This technical report summarizes the UCN 3 and 4 I/O database points and is expected to be an important for many disciplines. There are several kind of plant tests before the commercial operation such as Preoperational Test, Cold Hydro Test (CHT), Hot Functional Test (HFT), and Power Ascension Test (PAT). Those are performed in a manner that the validity of the sensor inputs got to the Plant Computer System (PCS) and operational integrity of plant are determined by monitoring the addressable I/O point identification (PID) on the Plant Computer System operator console. For better performance of activities like Emergency Operating Procedure (EOP) computerization, Safety Parameter Display System (SPDS) development, and organizing integrated database for NSSS, referencing the past plant information about I/O database is highly expected. What's more, it is inevitable material for plant system research and general design document work to be done in future. So we present this report based on UCN database for better understanding of plant computer system. 5 refs. (Author) .new

  2. UCH 3 and 4 plant computer system I/O point summary

    Energy Technology Data Exchange (ETDEWEB)

    Sohn, Kwang Young; Lee, Tae Hoon; Lee, Soon Sung; Lee, Byung Chae; Yoon, Jong Keon; Park, Jeong Suk; Baek, Seung Min; Shin, Hyun Kook [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1996-05-01

    This technical report summarizes the UCN 3 and 4 I/O database points and is expected to be an important for many disciplines. There are several kind of plant tests before the commercial operation such as Preoperational Test, Cold Hydro Test (CHT), Hot Functional Test (HFT), and Power Ascension Test (PAT). Those are performed in a manner that the validity of the sensor inputs got to the Plant Computer System (PCS) and operational integrity of plant are determined by monitoring the addressable I/O point identification (PID) on the Plant Computer System operator console. For better performance of activities like Emergency Operating Procedure (EOP) computerization, Safety Parameter Display System (SPDS) development, and organizing integrated database for NSSS, referencing the past plant information about I/O database is highly expected. What`s more, it is inevitable material for plant system research and general design document work to be done in future. So we present this report based on UCN database for better understanding of plant computer system. 5 refs. (Author) .new.

  3. IoT E-business applications

    OpenAIRE

    Radu BUCEA-MANEA-TONIS; Rocsana B. Manea Tonis

    2017-01-01

    “Internet of things” (IoT) will develop soon an ecosystem of internet-connected things, that facilitate the mobile commerce experiences and the client need to be informed all the time. It will be associated with a feeling of freedom and capacity of doing very easy what was considered difficult in the past. Nevertheless, these opportunities will not be capitalized upon without overcoming a series of obstacles, including addressing consumer privacy concerns, the long replacement cycles of du...

  4. Conflict Detection Algorithm to Minimize Locking for MPI-IO Atomicity

    Science.gov (United States)

    Sehrish, Saba; Wang, Jun; Thakur, Rajeev

    Many scientific applications require high-performance concurrent I/O accesses to a file by multiple processes. Those applications rely indirectly on atomic I/O capabilities in order to perform updates to structured datasets, such as those stored in HDF5 format files. Current support for atomicity in MPI-IO is provided by locking around the operations, imposing lock overhead in all situations, even though in many cases these operations are non-overlapping in the file. We propose to isolate non-overlapping accesses from overlapping ones in independent I/O cases, allowing the non-overlapping ones to proceed without imposing lock overhead. To enable this, we have implemented an efficient conflict detection algorithm in MPI-IO using MPI file views and datatypes. We show that our conflict detection scheme incurs minimal overhead on I/O operations, making it an effective mechanism for avoiding locks when they are not needed.

  5. Enabling IoT ecosystems through platform interoperability

    OpenAIRE

    Bröring, Arne; Schmid, Stefan; Schindhelm, Corina-Kim; Khelil, Abdelmajid; Kabisch, Sebastian; Kramer, Denis; Le Phuoc, Danh; Mitic, Jelena; Anicic, Darko; Teniente López, Ernest

    2017-01-01

    Today, the Internet of Things (IoT) comprises vertically oriented platforms for things. Developers who want to use them need to negotiate access individually and adapt to the platform-specific API and information models. Having to perform these actions for each platform often outweighs the possible gains from adapting applications to multiple platforms. This fragmentation of the IoT and the missing interoperability result in high entry barriers for developers and prevent the emergence of broa...

  6. iOS cloud development dor dummies

    CERN Document Server

    Goldstein, Neal

    2012-01-01

    Want to create robust, data-driven, iOS cloud apps? This book makes it easier! Apple's mobile operating system (iOS) supports iPhones, iPads, iPods and other Apple devices, and while even beginners can now develop apps to run just on these devices themselves, sometimes you want to create an app with more heft. Applications such as live weather reports or multi-player games require a lot of data to be pulled from outside—often from cloud-based Web Services, such as Google or Amazon. This book, written by application development experts Sujee Maniyam and Neal Goldstein, shows you how to we

  7. Event Sequence Analysis of the Air Intelligence Agency Information Operations Center Flight Operations

    National Research Council Canada - National Science Library

    Larsen, Glen

    1998-01-01

    This report applies Event Sequence Analysis, methodology adapted from aircraft mishap investigation, to an investigation of the performance of the Air Intelligence Agency's Information Operations Center (IOC...

  8. Transformation of Operations Management through Information Technology and Information System in Suning

    Institute of Scientific and Technical Information of China (English)

    SHEN Houcai; YAN Xiaojun

    2004-01-01

    Information technology and information system today play major roles in companies who are competitive in the global market. In this paper, we will study how Suning Appliance Chain changes her operations by using information technology and information system. Suning's Strategy,operations structure, especially her logistics system are discussed firstly; how information technology and information system support her operation and logistics to gain competitive capabilities are further discussed. Finally, the operation system transformation through IT/IS in Suning is studied by the use of a stochastic inventory model.

  9. BRC/IoP standard importance in packaging quality assurance

    Directory of Open Access Journals (Sweden)

    Agnieszka Kawecka

    2014-10-01

    Full Text Available BRC/IoP (British Retail Consortium / Institute of Packaging is the only industry standard dedicated entrepreneurs operating in the packaging industry, primarily intended for contact with food. The requirements of the BRC / IoP guarantee the safety of packaging and fulfillment of all legal and hygienic requirements. The article presents the main features of the standard, the basic requirements contained in the document and the results of research on the implementation of quality management systems, including standard BRC / IoP and the actions that are required checklists. It is noticeable that there is little interest in certification BRC / IoP, due to low awareness of the standard, despite the fulfillment of some of the basic requirements of the surveyed companies.

  10. The integrated approach methodology for operator information evaluation

    International Nuclear Information System (INIS)

    Stroube, K.; Modarres, M.; Roush, M.; Hunt, N.; Pearce, R.

    1986-01-01

    The Integrated Approach has developed a complete method for evaluating the relative importance of operation information improvements. By use of decision trees the impact of information on success probability of a function or system can be evaluated. This approach couples goal trees and human success likelihoods to estimate anticipated consequences of a given information system

  11. The concept of information support system for operational personnel of operating NPPs

    International Nuclear Information System (INIS)

    Dunaev, V.G.; Golovanov, V.V.

    1993-01-01

    The paper has been prepared on the materials of the concept developed by the order of ''Rosenergoatom'' concern. In the present paper the main definitions, the principal objectives and functions of the operator support system (OSS) are stated, a brief analysis of operation features of some existing operator information systems is presented, the main trends of development of operator information support system are given, the way and the sequence for implementation of the systems for operating NPPs are reviewed. In this proposed concept in the first place are considered the information support systems for the operators of the power unit main control rooms, however, the presented principles may be applied while designing information support systems for operators of other control rooms of NPP. 4 refs

  12. A quantitative approach to modeling the information processing of NPP operators under input information overload

    International Nuclear Information System (INIS)

    Kim, Jong Hyun; Seong, Poong Hyun

    2002-01-01

    This paper proposes a quantitative approach to modeling the information processing of NPP operators. The aim of this work is to derive the amount of the information processed during a certain control task under input information overload. We primarily develop the information processing model having multiple stages, which contains information flow. Then the uncertainty of the information is quantified using the Conant's model, a kind of information theory. We also investigate the applicability of this approach to quantifying the information reduction of operators under the input information overload

  13. iOS 7 programming pushing the limits

    CERN Document Server

    Napier, Rob

    2014-01-01

    Get ready to create killer apps for iPad and iPhone on the new iOS 7! With Apple's introduction of iOS 7, demand for developers who know the new iOS will be high. You need in-depth information about the new characteristics and capabilities of iOS 7, and that's what you'll find in this book. If you have experience with C or C++, this guide will show you how to create amazing apps for iPhone, iPad, and iPod touch. You'll also learn to maximize your programs for mobile devices using iPhone SDK 7.0. Advanced topics such as security services, running on multiple iPlatforms, and local networking w

  14. Volcanic eruptions on Io

    Science.gov (United States)

    Strom, R. G.; Schneider, N. M.; Terrile, R. J.; Hansen, C.; Cook, A. F.

    1981-01-01

    Nine eruption plumes which were observed during the Voyager 1 encounter with Io are discussed. During the Voyager 2 encounter, four months later, eight of the eruptions were still active although the largest became inactive sometime between the two encounters. Plumes range in height from 60 to over 300 km with corresponding ejection velocities of 0.5 to 1.0 km/s and plume sources are located on several plains and consist of fissures or calderas. The shape and brightness distribution together with the pattern of the surface deposition on a plume 3 is simulated by a ballistic model with a constant ejection velocity of 0.5 km/s and ejection angles which vary from 0-55 deg. The distribution of active and recent eruptions is concentrated in the equatorial regions and indicates that volcanic activity is more frequent and intense in the equatorial regions than in the polar regions. Due to the geologic setting of certain plume sources and large reservoirs of volatiles required for the active eruptions, it is concluded that sulfur volcanism rather than silicate volcanism is the most likely driving mechanism for the eruption plumes.

  15. BlendCAC: A BLockchain-ENabled Decentralized Capability-based Access Control for IoTs

    OpenAIRE

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-01-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide smart services with or without human intervention. While leveraging the large scale IoT based applications like Smart Gird or Smart Cities, IoTs also incur more concerns on privacy and security. Among the top security challenges that IoTs face, access authorization is critical in resource sharing and information protection. One of the weaknesses in today's access control (AC) is ...

  16. Improving plant state information for better operational safety

    International Nuclear Information System (INIS)

    Girard, C.; Olivier, E.; Grimaldi, X.

    1994-01-01

    Nuclear Power Plant (NPP) safety is strongly dependent on components' reliability and particularly on plant state information reliability. This information, used by the plant operators in order to produce appropriate actions, have to be of a high degree of confidence, especially in accidental conditions where safety is threatened. In this perspective, FRAMATOME, EDF and CEA have started a joint research program to prospect different solutions aiming at a better reliability for critical information needed to safety operate the plant. This paper gives the main results of this program and describes the developments that have been made in order to assess reliability of different information systems used in a Nuclear Power Plant. (Author)

  17. Analysis of Informal Credit Operations among Farmers In Atisbo ...

    African Journals Online (AJOL)

    Analysis of Informal Credit Operations among Farmers In Atisbo Local ... Some of the respondents (16.7%) had no formal education though they were managing ... Intensive use of extension services to facilitate adult literacy and learning ...

  18. Red Team Operations to Assess Information Technology Vulnerabilities

    NARCIS (Netherlands)

    Veltman, M.; Parker, R.L.

    1999-01-01

    All Information and Communication Technology (ICT) systems have vulnerabilities. Weaknesses in these systems are introduced either during the specification, implementation or operational phase. Leaving aside these introduced vulnerabilities are intentional or unintentional, the fact remains that

  19. An information theory-based approach to modeling the information processing of NPP operators

    International Nuclear Information System (INIS)

    Kim, Jong Hyun; Seong, Poong Hyun

    2002-01-01

    This paper proposes a quantitative approach to modeling the information processing of NPP operators. The aim of this work is to derive the amount of the information processed during a certain control task. The focus will be on i) developing a model for information processing of NPP operators and ii) quantifying the model. To resolve the problems of the previous approaches based on the information theory, i.e. the problems of single channel approaches, we primarily develop the information processing model having multiple stages, which contains information flows. Then the uncertainty of the information is quantified using the Conant's model, a kind of information theory

  20. An Application-Driven Modular IoT Architecture

    Directory of Open Access Journals (Sweden)

    Kumar Yelamarthi

    2017-01-01

    Full Text Available Building upon the advancements in the recent years, a new paradigm in technology has emerged in Internet of Things (IoT. IoT has allowed for communication with the surrounding environment through a multitude of sensors and actuators, yet operating on limited energy. Several researchers have presented IoT architectures for respective applications, often challenged by requiring major updates for adoption to a different application. Further, this comes with several uncertainties such as type of computational device required at the edge, mode of wireless connectivity required, methods to obtain power efficiency, and not ensuring rapid deployment. This paper starts with providing a horizontal overview of each layer in IoT architecture and options for different applications. Then it presents a broad application-driven modular architecture, which can be easily customized for rapid deployment. This paper presents the diverse hardware used in several IoT layers such as sensors, embedded processors, wireless transceivers, internet gateway, and application management cloud server. Later, this paper presents implementation results for diverse applications including healthcare, structural health monitoring, agriculture, and indoor tour guide systems. It is hoped that this research will assist the potential user to easily choose IoT hardware and software as it pertains to their respective needs.

  1. Meeting the reactor operator's information needs using functional analysis

    International Nuclear Information System (INIS)

    Nelson, W.R.; Clark, M.T.

    1980-01-01

    Since the accident at Three Mile Island, many ideas have been proposed for assisting the reactor operator during emergency situations. However, some of the suggested remedies do not alleviate an important shortcoming of the TMI control room: the operators were not presented with the information they needed in a manner which would allow prompt diagnosis of the problem. To address this problem, functional analysis is being applied at the LOFT facility to ensure that the operator's information needs are being met in his procedures and graphic displays. This paper summarizes the current applications of functional analysis at LOFT

  2. Operator Informational Needs for Multiple Autonomous Small Vehicles

    Science.gov (United States)

    Trujillo, Anna C.; Fan, Henry; Cross, Charles D.; Hempley, Lucas E.; Cichella, Venanzio; Puig-Navarro, Javier; Mehdi, Syed Bilal

    2015-01-01

    With the anticipated explosion of small unmanned aerial vehicles, it is highly likely that operators will be controlling fleets of autonomous vehicles. To fulfill the promise of autonomy, vehicle operators will not be concerned with manual control of the vehicle; instead, they will deal with the overall mission. Furthermore, the one operator to many vehicles is becoming a constant meme with various industries including package delivery, search and rescue, and utility companies. In order for an operator to concurrently control several vehicles, his station must look and behave very differently than the current ground control station instantiations. Furthermore, the vehicle will have to be much more autonomous, especially during non-normal operations, in order to accommodate the knowledge deficit or the information overload of the operator in charge of several vehicles. The expected usage increase of small drones requires presenting the operational information generated by a fleet of heterogeneous autonomous agents to an operator. NASA Langley Research Center's Autonomy Incubator has brought together researchers in various disciplines including controls, trajectory planning, systems engineering, and human factors to develop an integrated system to study autonomy issues. The initial human factors effort is focusing on mission displays that would give an operator the overall status of all autonomous agents involved in the current mission. This paper will discuss the specifics of the mission displays for operators controlling several vehicles.

  3. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 3. Network Centric Warfare Insights

    Science.gov (United States)

    2003-01-01

    OPSEC), military deception, psychological operations (PSYOPS), special information operations (IO), information assurance, physical security...nonlethal effects, such as operational 8 Network Centric Warfare Case Study security (OPSEC), military deception, psychological operations (PSYOP...Support Operations Group ASR Alternate Supply Route; or, Ammunition Supply Rate ATACMS Army Tactical Missile System ATARS Advanced

  4. FIRE - Flyby of Io with Repeat Encounters: A conceptual design for a New Frontiers mission to Io

    Science.gov (United States)

    Suer, Terry-Ann; Padovan, Sebastiano; Whitten, Jennifer L.; Potter, Ross W. K.; Shkolyar, Svetlana; Cable, Morgan; Walker, Catherine; Szalay, Jamey; Parker, Charles; Cumbers, John; Gentry, Diana; Harrison, Tanya; Naidu, Shantanu; Trammell, Harold J.; Reimuller, Jason; Budney, Charles J.; Lowes, Leslie L.

    2017-09-01

    A conceptual design is presented for a low complexity, heritage-based flyby mission to Io, Jupiter's innermost Galilean satellite and the most volcanically active body in the Solar System. The design addresses the 2011 Decadal Survey's recommendation for a New Frontiers class mission to Io and is based upon the result of the June 2012 NASA-JPL Planetary Science Summer School. A science payload is proposed to investigate the link between the structure of Io's interior, its volcanic activity, its surface composition, and its tectonics. A study of Io's atmospheric processes and Io's role in the Jovian magnetosphere is also planned. The instrument suite includes a visible/near-IR imager, a magnetic field and plasma suite, a dust analyzer, and a gimbaled high gain antenna to perform radio science. Payload activity and spacecraft operations would be powered by three Advanced Stirling Radioisotope Generators (ASRG). The primary mission includes 10 flybys with close-encounter altitudes as low as 100 km. The mission risks are mitigated by ensuring that relevant components are radiation tolerant and by using redundancy and flight-proven parts in the design. The spacecraft would be launched on an Atlas V rocket with a delta-v of 1.3 km/s. Three gravity assists (Venus, Earth, Earth) would be used to reach the Jupiter system in a 6-year cruise. The resulting concept demonstrates the rich scientific return of a flyby mission to Io.

  5. High-performance file I/O in Java : existing approaches and bulk I/O extensions.

    Energy Technology Data Exchange (ETDEWEB)

    Bonachea, D.; Dickens, P.; Thakur, R.; Mathematics and Computer Science; Univ. of California at Berkeley; Illinois Institute of Technology

    2001-07-01

    There is a growing interest in using Java as the language for developing high-performance computing applications. To be successful in the high-performance computing domain, however, Java must not only be able to provide high computational performance, but also high-performance I/O. In this paper, we first examine several approaches that attempt to provide high-performance I/O in Java - many of which are not obvious at first glance - and evaluate their performance on two parallel machines, the IBM SP and the SGI Origin2000. We then propose extensions to the Java I/O library that address the deficiencies in the Java I/O API and improve performance dramatically. The extensions add bulk (array) I/O operations to Java, thereby removing much of the overhead currently associated with array I/O in Java. We have implemented the extensions in two ways: in a standard JVM using the Java Native Interface (JNI) and in a high-performance parallel dialect of Java called Titanium. We describe the two implementations and present performance results that demonstrate the benefits of the proposed extensions.

  6. Semantic Interoperability in Heterogeneous IoT Infrastructure for Healthcare

    Directory of Open Access Journals (Sweden)

    Sohail Jabbar

    2017-01-01

    Full Text Available Interoperability remains a significant burden to the developers of Internet of Things’ Systems. This is due to the fact that the IoT devices are highly heterogeneous in terms of underlying communication protocols, data formats, and technologies. Secondly due to lack of worldwide acceptable standards, interoperability tools remain limited. In this paper, we proposed an IoT based Semantic Interoperability Model (IoT-SIM to provide Semantic Interoperability among heterogeneous IoT devices in healthcare domain. Physicians communicate their patients with heterogeneous IoT devices to monitor their current health status. Information between physician and patient is semantically annotated and communicated in a meaningful way. A lightweight model for semantic annotation of data using heterogeneous devices in IoT is proposed to provide annotations for data. Resource Description Framework (RDF is a semantic web framework that is used to relate things using triples to make it semantically meaningful. RDF annotated patients’ data has made it semantically interoperable. SPARQL query is used to extract records from RDF graph. For simulation of system, we used Tableau, Gruff-6.2.0, and Mysql tools.

  7. Turning Internet of Things(IoT) into Internet of Vulnerabilities (IoV) : IoT Botnets

    OpenAIRE

    Angrishi, Kishore

    2017-01-01

    Internet of Things (IoT) is the next big evolutionary step in the world of internet. The main intention behind the IoT is to enable safer living and risk mitigation on different levels of life. With the advent of IoT botnets, the view towards IoT devices has changed from enabler of enhanced living into Internet of vulnerabilities for cyber criminals. IoT botnets has exposed two different glaring issues, 1) A large number of IoT devices are accessible over public Internet. 2) Security (if cons...

  8. Operator interface design considerations for a PACS information management system

    Science.gov (United States)

    Steinke, James E.; Nabijee, Kamal H.; Freeman, Rick H.; Prior, Fred W.

    1990-08-01

    As prototype PACS grow into fully digital departmental and hospital-wide systems, effective information storage and retrieval mechanisms become increasingly important. Thus far, designers of PACS workstations have concentrated on image communication and display functionality. The new challenge is to provide appropriate operator interface environments to facilitate information retrieval. The "Marburg Model" 1 provides a detailed analysis of the functions, control flows and data structures used in Radiology. It identifies a set of "actors" who perform information manipulation functions. Drawing on this model and its associated methodology it is possible to identify four modes of use of information systems in Radiology: Clinical Routine, Research, Consultation, and Administration. Each mode has its own specific access requirements and views of information. An operator interface strategy appropriate for each mode will be proposed. Clinical Routine mode is the principal concern of PACS primary diagnosis workstations. In a full PACS implementation, such workstations must provide a simple and consistent navigational aid for the on-line image database, a local work list of cases to be reviewed, and easy access to information from other hospital information systems. A hierarchical method of information access is preferred because it provides the ability to start at high-level entities and iteratively narrow the scope of information from which to select subsequent operations. An implementation using hierarchical, nested software windows which fulfills such requirements shall be examined.

  9. IoT-Based Library Automation and Monitoring system: Developing an Implementation framework of Implementation

    OpenAIRE

    Bayani, Majid; Segura, Alberto; Alvarado, Marjorie; Loaiza, Mayra

    2018-01-01

    Currently, the Information and Communication Technology (ICT) and related topics such as Internet of Things (IoT) have an essential influence on all elements of human life. IoT as a prevalent phenomenon is transforming daily life by the usage of the smart features of Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) technologies. As IoT progresses, it has extended in size and dimension, improving many contexts of the society; such as, the traditional library system. This...

  10. An iOS implementation of the Shannon switching game

    OpenAIRE

    Macík, Miroslav

    2013-01-01

    Shannon switching game is a logical graph game for two players. The game was created by American mathematician Claude Shannon. iOS is an operating system designed for iPhone cellular phone, iPod music player and iPad tablet. The thesis describes existing implementations of the game and also specific implementation for iOS operating system created as a part of this work. This implementation allows you to play against virtual opponent and also supports multiplayer game consisting of two players...

  11. iOS 6 foundations

    CERN Document Server

    Feiler, Jesse

    2013-01-01

    A practical introduction for using iOS 6 to create universal apps If you have prior experience programming in an object-oriented language and are eager to start building universal apps for iPad and iPhone (including the iPod touch), then this is the book for you! Using the latest version of iOS (iOS 6) along with the latest version of Xcode (Xcode 4.5), this book is a practical introduction rather than just a catalog of components. Full-color and packed with groundbreaking, innovative designs, this book teaches you how to create eye-catching, unique apps. Teaches you the va

  12. Method and Apparatus Providing Deception and/or Altered Operation in an Information System Operating System

    Science.gov (United States)

    Cohen, Fred; Rogers, Deanna T.; Neagoe, Vicentiu

    2008-10-14

    A method and/or system and/or apparatus providing deception and/or execution alteration in an information system. In specific embodiments, deceptions and/or protections are provided by intercepting and/or modifying operation of one or more system calls of an operating system.

  13. Management of information for mission operations using automated keyword referencing

    Science.gov (United States)

    Davidson, Roger A.; Curran, Patrick S.

    1993-01-01

    Although millions of dollars have helped to improve the operability and technology of ground data systems for mission operations, almost all mission documentation remains bound in printed volumes. This form of documentation is difficult and timeconsuming to use, may be out-of-date, and is usually not cross-referenced with other related volumes of mission documentation. A more effective, automated method of mission information access is needed. A new method of information management for mission operations using automated keyword referencing is proposed. We expound on the justification for and the objectives of this concept. The results of a prototype tool for mission information access that uses a hypertextlike user interface and existing mission documentation are shared. Finally, the future directions and benefits of our proposed work are described.

  14. User's operating procedures. Volume 3: Projects directorate information programs

    Science.gov (United States)

    Haris, C. G.; Harris, D. K.

    1985-01-01

    A review of the user's operating procedures for the scout project automatic data system, called SPADS is presented. SPADS is the results of the past seven years of software development on a prime mini-computer. SPADS was developed as a single entry, multiple cross-reference data management and information retrieval system for the automation of Project office tasks, including engineering, financial, managerial, and clerical support. This volume, three of three, provides the instructions to operate the projects directorate information programs in data retrieval and file maintenance via the user friendly menu drivers.

  15. User's operating procedures. Volume 1: Scout project information programs

    Science.gov (United States)

    Harris, C. G.; Harris, D. K.

    1985-01-01

    A review of the user's operating procedures for the Scout Project Automatic Data System, called SPADS is given. SPADS is the result of the past seven years of software development on a Prime minicomputer located at the Scout Project Office. SPADS was developed as a single entry, multiple cross reference data management and information retrieval system for the automation of Project office tasks, including engineering, financial, managerial, and clerical support. The instructions to operate the Scout Project Information programs in data retrieval and file maintenance via the user friendly menu drivers is presented.

  16. Rutes amb iOS

    OpenAIRE

    Nofuentes Azcárate, Pedro

    2011-01-01

    Projecte de l'implementació d'una aplicació per registrar i gestionar recorreguts basada al sistema operatiu iOS amb la possibilitat de sincronitzar amb un servei web sobre la plataforma Google App Engine. Proyecto de implementación de una aplicación para registrar y gestionar recorridos basada en el sistema operativo iOS con la posibilidad de sincronizar con un servicio web sobre la plataforma Google App Engine. Implementation project for an application to record and manage routes, bas...

  17. iOS 5 Essentials

    CERN Document Server

    Daniel, Steven F

    2012-01-01

    Each chapter will take you through a new major feature of iOS 5. You will learn how to integrate each feature into your applications. If you ever wanted to learn about the latest features of iOS 5 and learn how to incorporate Twitter, iCloud and Core Image framework effects functionality into your applications, then this book is for you. You should have a good knowledge of programming experience with Objective-C, and have used Xcode 4. iPhone programming experience is not required.

  18. IoT-based Asset Management System for Healthcare-related Industries

    Directory of Open Access Journals (Sweden)

    Lee Carman Ka Man

    2015-11-01

    Full Text Available The healthcare industry has been focusing efforts on optimizing inventory management procedures through the incorporation of Information and Communication Technology, in the form of tracking devices and data mining, to establish ideal inventory models. In this paper, a roadmap is developed towards a technological assessment of the Internet of Things (IoT in the healthcare industry, 2010–2020. According to the roadmap, an IoT-based healthcare asset management system (IoT-HAMS is proposed and developed based on Artificial Neural Network (ANN and Fuzzy Logic (FL, incorporating IoT technologies for asset management to optimize the supply of resources.

  19. New Ways in the Cognitive Dimension of Information Operations

    Directory of Open Access Journals (Sweden)

    Haig Zsolt

    2017-06-01

    Full Text Available In this paper the authors introduce the cognitive dimension that is becoming more and more important in the field of information operations with special regard to psychological operations (PSYOPS. The strengthening role of influencing skills and technological progress has created new avenues and opportunities in the military field. The paper seeks to point out the relationship between marketing and PSYOPS. In connection with this, the study intends to present a new approach to PSYOPS that can achieve the operational goals which set by the leader by applying guerrilla marketing tools and methods.

  20. Human‐Centric IoT Networks

    DEFF Research Database (Denmark)

    Mihovska, Albena Dimitrova; Prasad, Ramjee; Pejanovic, Milica

    2017-01-01

    The current Internet of things (IoT) concept is characterized with billions and billions of devices interworking through a myriad of technologies for the delivery of smart personalized services and applications. At the center of these is the human user who drives his/her own interconnected cluster....... It can be expected in the future that the number of such clusters will grow exponentially, leading to an ultradense environment of interconnected devices belonging to the same or different clusters with the human user as the center point for the information being sensed, gathered, and processed...

  1. 75 FR 47631 - Swets Information Services, Operations Department, Information Technology Group, Marketing Group...

    Science.gov (United States)

    2010-08-06

    ... DEPARTMENT OF LABOR Employment and Training Administration [TA-W-73,668] Swets Information Services, Operations Department, Information Technology Group, Marketing Group, Finance Group, Runnemede..., Information Technology (IT) Group, Marketing Group and the Finance Group into one entity instead of...

  2. Students versus IoT Security

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    What happens when you introduce students to IoT security for the first time? In this talk I will tell you about my first experience with IoT Security and the thought process behind the decisions I made.

  3. Information Technology In Supply Chain Operations: A Road Map ...

    African Journals Online (AJOL)

    A five phase model and seven-step practical plan are proposed after careful evaluation of critical success factors, the role of IT in SCM and the overall benefits which can result in successful application of IT to SC operations. The paper concludes by stressing that connecting numerous information systems and integrating ...

  4. Dangoraižio projektavimo ypatumai

    Directory of Open Access Journals (Sweden)

    Robertas Volvačiovas

    2011-06-01

    Full Text Available Santrauka. Straipsnyje išskiriami pagrindiniai dangoraižio įgyvendinimo ir gyvavimo etapai, aptariamas dangoraižio projektavimo etapas, dangoraižio techninio projekto (TP ir darbo projekto (DP sudėtis, išskiriamos pagrindinės dangoraižių problemos, iškylančios projektavimo etape, ir pateikiami sprendimo būdai.Straipsnis lietuvių kalba

  5. The Method of System Test using I/O Stimulator

    International Nuclear Information System (INIS)

    Kim, Jang Yeol; Lee, Dong Young; Kim, Chang Hoi

    2016-01-01

    In general, the software development life cycle consists of the requirement phase, design phase, implementation phase, testing phase, integration phase (software-software integration, software-hardware integration), installation phase, and operation and maintenance phase. The fundamental parts to the testing phase are component test, software integration test, software hardware integration test, and system test. Among these tests, we focused in particular on system test using I/O stimulator. The system test operates the functionality, performance, and interface because system testing falls within the scope of black box testing, which should not require knowledge of the inner design of the code or logic. The purpose of developing a system test using a I/O stimulator is to save time and effort from the functionality and performance tests. We developed an I/O stimulator for the burning system test based on the operational scenario. The hardware, software, and manmachine- interface (MMI) are fundamental parts to the I/O stimulator. Signal sources from the I/O stimulator contain analog input, analog output, digital input, digital output, a Programmable Power Supply, an RS232C Serial interface and a dual port Ethernet interface. While automation cannot reproduce everything that a software engineer can do, it can be extremely useful for the system test. However, it does require the test criteria and a well-developed test suite of the testing scripts in order to be useful. In this study, we developed a multipurpose and cost-efficient I/O stimulator using LabVIEW program instead of the testing scripts

  6. The Method of System Test using I/O Stimulator

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jang Yeol; Lee, Dong Young; Kim, Chang Hoi [KAERI, Daejeon (Korea, Republic of)

    2016-05-15

    In general, the software development life cycle consists of the requirement phase, design phase, implementation phase, testing phase, integration phase (software-software integration, software-hardware integration), installation phase, and operation and maintenance phase. The fundamental parts to the testing phase are component test, software integration test, software hardware integration test, and system test. Among these tests, we focused in particular on system test using I/O stimulator. The system test operates the functionality, performance, and interface because system testing falls within the scope of black box testing, which should not require knowledge of the inner design of the code or logic. The purpose of developing a system test using a I/O stimulator is to save time and effort from the functionality and performance tests. We developed an I/O stimulator for the burning system test based on the operational scenario. The hardware, software, and manmachine- interface (MMI) are fundamental parts to the I/O stimulator. Signal sources from the I/O stimulator contain analog input, analog output, digital input, digital output, a Programmable Power Supply, an RS232C Serial interface and a dual port Ethernet interface. While automation cannot reproduce everything that a software engineer can do, it can be extremely useful for the system test. However, it does require the test criteria and a well-developed test suite of the testing scripts in order to be useful. In this study, we developed a multipurpose and cost-efficient I/O stimulator using LabVIEW program instead of the testing scripts.

  7. A Reference Model for Monitoring IoT WSN-Based Applications.

    Science.gov (United States)

    Capella, Juan Vicente; Campelo, José Carlos; Bonastre, Alberto; Ors, Rafael

    2016-10-30

    The Internet of Things (IoT) is, at this moment, one of the most promising technologies that has arisen for decades. Wireless Sensor Networks (WSNs) are one of the main pillars for many IoT applications, insofar as they require to obtain context-awareness information. The bibliography shows many difficulties in their real implementation that have prevented its massive deployment. Additionally, in IoT environments where data producers and data consumers are not directly related, compatibility and certification issues become fundamental. Both problems would profit from accurate knowledge of the internal behavior of WSNs that must be obtained by the utilization of appropriate tools. There are many ad-hoc proposals with no common structure or methodology, and intended to monitor a particular WSN. To overcome this problem, this paper proposes a structured three-layer reference model for WSN Monitoring Platforms (WSN-MP), which offers a standard environment for the design of new monitoring platforms to debug, verify and certify a WSN's behavior and performance, and applicable to every WSN. This model also allows the comparative analysis of the current proposals for monitoring the operation of WSNs. Following this methodology, it is possible to achieve a standardization of WSN-MP, promoting new research areas in order to solve the problems of each layer.

  8. Heat flow from Io /JI/

    Science.gov (United States)

    Matson, D. L.; Ransford, G. A.; Johnson, T. V.

    1981-01-01

    The existing ground-based measurements of Io's thermal emission at infrared wavelengths of 8.4, 10.6, and 21 microns have been reexamined. Present in these data is the signature of hot spots, presumably similar to the hot spots seen by the IRIS experiment on Voyager. It is possible to extract from these data the total amount of power radiated. Since the hot spots are believed to be a result of deep-seated activity in Io and since the remainder of Io's surface is an extraordinarily poor thermal conductor, the power radiated by the hot spots is essentially the total heat flow. The analysis yields a heat flow of 2 + or - 1 W/sq m. This value is tremendously large in comparison to the average heat flow of the earth (0.06 W/sq m) and the moon (0.02 W/sq m), but is characteristic of active geothermal areas on the earth. A heat flow this large requires that the interior of Io be at least partially molten on a global scale.

  9. IOS SAFETY APPLICATION FOR UITM

    Directory of Open Access Journals (Sweden)

    MOHAMAD FAHMI HUSSIN

    2016-04-01

    Full Text Available This paper presents an iOS application, which is developed, to ensure that every task related to safety and health such as inspection, deviation analysis and accident reporting becomes more simple and easier. Normally, these three (3 tasks are done separately and the data are saved in different ways. These situations make the tasks become complicated and consume a lot of time. Therefore, this application is developed to overcome all the problems that occurred. The main objective of this application is to allow the user to handle inspection checklist, deviation analysis and accident reporting efficiently by using iOS devices such as iPhone and iPad. Hence, using iOS device, instead of using a lot of paper, can do all the tasks. Using Xcode SDK, which is the software that is used to develop iOS application, developed this application. Xcode use Objective-C as the programming language, which is quite similar with other programming languages such as C and C++. The final result of this project is that this application can handle all the three (3 tasks and the form or the findings can be emailed to the Safety and Health Officer (SHO. This application will reduce time consume to conduct safety inspection, deviation and reporting tasks as well as avoid delay that might happen while using the traditional method.

  10. Learning iOS forensics

    CERN Document Server

    Epifani, Mattia

    2015-01-01

    If you are a digital forensics examiner daily involved in the acquisition and analysis of mobile devices and want to have a complete overview of how to perform your work on iOS devices, this book is definitely for you.

  11. Performance Analysis of Video PHY Controller Using Unidirection and Bi-directional IO Standard via 7 Series FPGA

    DEFF Research Database (Denmark)

    Das, Bhagwan; Abdullah, M F L; Hussain, Dil muhammed Akbar

    2017-01-01

    graphics consumes more power, this creates a need of designing the low power design for Video PHY controller. In this paper, the performance of Video PHY controller is analyzed by comparing the power consumption of unidirectional and bi-directional IO Standard over 7 series FPGA. It is determined...... that total on-chip power is reduced for unidirectional IO Standard based Video PHY controller compared to bidirectional IO Standard based Video PHY controller. The most significant achievement of this work is that it is concluded that unidirectional IO Standard based Video PHY controller consume least...... standby power compared to bidirectional IO Standard based Video PHY controller. It is defined that for 6 GHz operated frequency Video PHY controller, the 32% total on-chip power is reduced using unidirectional IO Standard based Video PHY controller is less compared to bidirectional IO Standard based Video...

  12. Identification of the operating crew's information needs for accident management

    International Nuclear Information System (INIS)

    Nelson, W.R.; Hanson, D.J.; Ward, L.W.; Solberg, D.E.

    1988-01-01

    While it would be very difficult to predetermine all of the actions required to mitigate the consequences of every potential severe accident for a nuclear power plant, development of additional guidance and training could improve the likelihood that the operating crew would implement effective sever-accident management measures. The US Nuclear Regulatory Commission (NRC) is conducting an Accident Management Research Program that emphasizes the application of severe-accident research results to enhance the capability of the plant operating crew to effectively manage severe accidents. One element of this program includes identification of the information needed by the operating crew in severe-accident situations. This paper discusses a method developed for identifying these information needs and its application. The methodology has been applied to a generic reactor design representing a PWR with a large dry containment. The information needs were identified by systematically determining what information is needed to assess the health of the critical functions, identify the presence of challenges, select strategies, and assess the effectiveness of these strategies. This method allows the systematic identification of information needs for a broad range of severe-accident scenarios and can be validated by exercising the functional models for any specific event sequence

  13. uFlip: Understanding Flash IO Patterns

    DEFF Research Database (Denmark)

    Bouganim, Luc; Jonsson, Bjørn; Bonnet, Philippe

    2009-01-01

    want to establish what kind of IOs should be favored (or avoided) when designing algorithms and architectures for flash-based systems. In this paper, we focus on flash IO patterns, that capture relevant distribution of IOs in time and space, and our goal is to quantify their performance. We define uFLIP...

  14. Implementation of operational meteorological information service for CARE REMDAS

    International Nuclear Information System (INIS)

    Oh, Sung Nam; Nam, Jae Cheol; Choi, Jae Chun; Lee, Byong Lyol; Lee, Bo Ram; Shin, Hyun Cheol; Park, Nan Ah; Song, Chang Keun; Park, Sang Jong

    1999-12-01

    The scope of this study consists of : improve of CARE REMDAS - identification of meteorolgical information required for nuclear emergency response and their efficient use on a real-time basis, review of the production and operation of KMA NWP nodels and their applications. Suggestions on the improvements in nuclear emergency response systme from the care studies of both domestic and foreign countries - case study of a domestic model for radioactivity T/D in terms of model dynamics and operation, investigation of promising support systems by reviewing the current status of T/D model in UK. Recommendations on a promising meteorological information sevices based on foreign cases - examinations of DWD system, including EU for nuclear emergency response, review on the meteorogical information support by DWD for NERS

  15. Implementation of operational meteorological information service for CARE REMDAS

    Energy Technology Data Exchange (ETDEWEB)

    Oh, Sung Nam; Nam, Jae Cheol; Choi, Jae Chun [Meteorological Reaearch Institute, Seoul (Korea, Republic of); Lee, Byong Lyol; Lee, Bo Ram; Shin, Hyun Cheol; Park, Nan Ah [Korea Meteorological Administration, Seoul (Korea, Republic of); Song, Chang Keun; Park, Sang Jong [Seoul National Univ., Seoul (Korea, Republic of)

    1999-12-15

    The scope of this study consists of : improve of CARE REMDAS - identification of meteorolgical information required for nuclear emergency response and their efficient use on a real-time basis, review of the production and operation of KMA NWP nodels and their applications. Suggestions on the improvements in nuclear emergency response systme from the care studies of both domestic and foreign countries - case study of a domestic model for radioactivity T/D in terms of model dynamics and operation, investigation of promising support systems by reviewing the current status of T/D model in UK. Recommendations on a promising meteorological information sevices based on foreign cases - examinations of DWD system, including EU for nuclear emergency response, review on the meteorogical information support by DWD for NERS.

  16. Exploring network operations for data and information networks

    Science.gov (United States)

    Yao, Bing; Su, Jing; Ma, Fei; Wang, Xiaomin; Zhao, Xiyang; Yao, Ming

    2017-01-01

    Barabási and Albert, in 1999, formulated scale-free models based on some real networks: World-Wide Web, Internet, metabolic and protein networks, language or sexual networks. Scale-free networks not only appear around us, but also have high qualities in the world. As known, high quality information networks can transfer feasibly and efficiently data, clearly, their topological structures are very important for data safety. We build up network operations for constructing large scale of dynamic networks from smaller scale of network models having good property and high quality. We focus on the simplest operators to formulate complex operations, and are interesting on the closeness of operations to desired network properties.

  17. Landform Degradation and Slope Processes on Io: The Galileo View

    Science.gov (United States)

    Moore, Jeffrey M.; Sullivan, Robert J.; Chuang, Frank C.; Head, James W., III; McEwen, Alfred S.; Milazzo, Moses P.; Nixon, Brian E.; Pappalardo, Robert T.; Schenk, Paul M.; Turtle, Elizabeth P.; hide

    2001-01-01

    The Galileo mission has revealed remarkable evidence of mass movement and landform degradation on Io. We recognize four major slope types observed on a number of intermediate resolution (250 m/pixel) images and several additional textures on very high resolution (10 m/pixel) images. Slopes and scarps on Io often show evidence of erosion, seen in the simplest form as alcove-carving slumps and slides at all scales. Many of the mass movement deposits on Io are probably mostly the consequence of block release and brittle slope failure. Sputtering plays no significant role. Sapping as envisioned by McCauley et al. remains viable. We speculate that alcove-lined canyons seen in one observation and lobed deposits seen along the bases of scarps in several locations may reflect the plastic deformation and 'glacial' flow of interstitial volatiles (e.g., SO2) heated by locally high geothermal energy to mobilize the volatile. The appearance of some slopes and near-slope surface textures seen in very high resolution images is consistent with erosion from sublimation-degradation. However, a suitable volatile (e.g., H2S) that can sublimate fast enough to alter Io's youthful surface has not been identified. Disaggregation from chemical decomposition of solid S2O and other polysulfur oxides may conceivably operate on Io. This mechanism could degrade landforms in a manner that resembles degradation from sublimation, and at a rate that can compete with resurfacing.

  18. Ultra-low power analog-digital converters for IoT

    NARCIS (Netherlands)

    Harpe, P.J.A.; Alioto, Massimo

    2017-01-01

    This chapter addresses ADCs for IoT nodes, which are needed to digitize sensor information before processing, storage or wireless transmission. ADCs are also required for the radio communication channel. This chapter focusses on successive approximation (SAR) ADCs, a popular architecture for IoT

  19. Galileo SSI Observations of Io During Orbits C30 I33

    Science.gov (United States)

    Keszthelyi, L.; Turtle, E.; McEwen, A.; Simonelli, D.; Geissler, P.; Williams, D.; Milazzo, M.; Radebaugh, J.; Jaeger, W.; Klaasen, K. P.

    2002-01-01

    New Galileo SSI imaging of Io from orbits C30 I33 will be presented. The aging Galileo spacecraft continues to produce spectacular new results, including the tallest volcanic plume yet found on Io. Additional information is contained in the original extended abstract.

  20. Galileo's Last Fly-Bys of Io: NIMS Observations of Loki, Tupan, and Emakong Calderas

    Science.gov (United States)

    Lopes, Rosaly M. C.; Kamp, L. W.; Davies, A. G.; Smythe, W. D.; Carlson, R. W.; Doute, S.; McEwen, A.; Turtle, E. P.; Leader, F.; Mehlman, R.

    2002-01-01

    NIMS results from the 2001 Galileo fly-bys of Io will be presented, focusing on three calderas that may contain lava lakes. Preliminary results from the January 2002 Io fly-by will be presented. Additional information is contained in the original extended abstract.

  1. Application-Tailored I/O with Streamline

    NARCIS (Netherlands)

    de Bruijn, W.J.; Bos, H.J.; Bal, H.E.

    2011-01-01

    Streamline is a stream-based OS communication subsystem that spans from peripheral hardware to userspace processes. It improves performance of I/O-bound applications (such as webservers and streaming media applications) by constructing tailor-made I/O paths through the operating system for each

  2. A Proof-of-Concept for Semantically Interoperable Federation of IoT Experimentation Facilities.

    Science.gov (United States)

    Lanza, Jorge; Sanchez, Luis; Gomez, David; Elsaleh, Tarek; Steinke, Ronald; Cirillo, Flavio

    2016-06-29

    The Internet-of-Things (IoT) is unanimously identified as one of the main pillars of future smart scenarios. The potential of IoT technologies and deployments has been already demonstrated in a number of different application areas, including transport, energy, safety and healthcare. However, despite the growing number of IoT deployments, the majority of IoT applications tend to be self-contained, thereby forming application silos. A lightweight data centric integration and combination of these silos presents several challenges that still need to be addressed. Indeed, the ability to combine and synthesize data streams and services from diverse IoT platforms and testbeds, holds the promise to increase the potentiality of smart applications in terms of size, scope and targeted business context. In this article, a proof-of-concept implementation that federates two different IoT experimentation facilities by means of semantic-based technologies will be described. The specification and design of the implemented system and information models will be described together with the practical details of the developments carried out and its integration with the existing IoT platforms supporting the aforementioned testbeds. Overall, the system described in this paper demonstrates that it is possible to open new horizons in the development of IoT applications and experiments at a global scale, that transcend the (silo) boundaries of individual deployments, based on the semantic interconnection and interoperability of diverse IoT platforms and testbeds.

  3. A Proof-of-Concept for Semantically Interoperable Federation of IoT Experimentation Facilities

    Directory of Open Access Journals (Sweden)

    Jorge Lanza

    2016-06-01

    Full Text Available The Internet-of-Things (IoT is unanimously identified as one of the main pillars of future smart scenarios. The potential of IoT technologies and deployments has been already demonstrated in a number of different application areas, including transport, energy, safety and healthcare. However, despite the growing number of IoT deployments, the majority of IoT applications tend to be self-contained, thereby forming application silos. A lightweight data centric integration and combination of these silos presents several challenges that still need to be addressed. Indeed, the ability to combine and synthesize data streams and services from diverse IoT platforms and testbeds, holds the promise to increase the potentiality of smart applications in terms of size, scope and targeted business context. In this article, a proof-of-concept implementation that federates two different IoT experimentation facilities by means of semantic-based technologies will be described. The specification and design of the implemented system and information models will be described together with the practical details of the developments carried out and its integration with the existing IoT platforms supporting the aforementioned testbeds. Overall, the system described in this paper demonstrates that it is possible to open new horizons in the development of IoT applications and experiments at a global scale, that transcend the (silo boundaries of individual deployments, based on the semantic interconnection and interoperability of diverse IoT platforms and testbeds.

  4. HUBBLE CLICKS IMAGES OF IO SWEEPING ACROSS JUPITER

    Science.gov (United States)

    2002-01-01

    are regions of sulfur dioxide frost. On Jupiter, the white and brown regions distinguish areas of high-altitude haze and clouds; the blue regions depict relatively clear skies at high altitudes. These images were taken July 22, 1997, in two wavelengths: 3400 Angstroms (ultraviolet) and 4100 Angstroms (violet). The colors do not correspond closely to what the human eye would see because ultraviolet light is invisible to the eye. Io: Jupiter's Volcanic Moon In the close-up picture of Io (bottom right), the mound rising from Io's surface is actually an eruption from Pillan, a volcano that had previously been dormant. Measurements at two ultraviolet wavelengths indicate that the ejecta consist of sulfur dioxide 'snow,' making the plume appear green in this false-color image. Astronomers increased the color contrast and added false colors to the image to make the faint plume visible. Pillan's plume is very hot and its ejecta is moving extremely fast. Based on information from the Galileo spacecraft, Pillan's outburst is at least 2,240 degrees Fahrenheit (1,500 degrees Kelvin). The late bloomer is spewing material at speeds of 1,800 mph (2,880 kilometers per hour). The hot sulfur dioxide gas expelled from the volcano cools rapidly as it expands into space, freezing into snow. Io is well known for its active volcanoes, many of which blast huge plumes of volcanic debris into space. Astronomers discovered Pillan's volcanic explosion while looking for similar activity from a known active volcano, Pele, about 300 miles (500 kilometers) away from Pillan. But Pele turned out to be peaceful. Io has hundreds of active volcanoes, but only a few, typically eight or nine, have visible plumes at any given time. Scientists will get a closer look at Io later this year during a pair of close flybys to be performed by NASA's Galileo spacecraft, which has been orbiting Jupiter and its moons for nearly 3-1/2 years. The first Galileo flyby is scheduled for Oct. 10 at an altitude of 379 miles

  5. Formal specification and implementation of operations in information management systems

    International Nuclear Information System (INIS)

    Sandewall, E.

    1983-02-01

    Among information management systems we include general purpose systems, such as text editors and data editors (forms management systems), as well as special purpose systems such as mail systems and computer based calendars. Based on a method for formal specification of some aspects of IMS, namely the structure of the data base, the update operations, and the user dialogue, the paper shows how reasonable procedures for executing IMS operations can be written in the notation of a first-order theory, in such a way that the procedure is a logical consequence of the specification. (Author)

  6. On I/O Virtualization Management

    Science.gov (United States)

    Danciu, Vitalian A.; Metzker, Martin G.

    The quick adoption of virtualization technology in general and the advent of the Cloud business model entail new requirements on the structure and the configuration of back-end I/O systems. Several approaches to virtualization of I/O links are being introduced, which aim at implementing a more flexible I/O channel configuration without compromising performance. While previously the management of I/O devices could be limited to basic technical requirments (e.g. the establishment and termination of fixed-point links), the additional flexibility carries in its wake additional management requirements on the representation and control of I/O sub-systems.

  7. IO CAREERS - Home

    Science.gov (United States)

    /Information Technology Economics/Trade Education/Training Energy Engineering Environment Finance/Accounting Jobs International Labor Organization, Senior-Level, Mid-Level, Entry-Level United Nations System / ILO , Switzerland (Geneva) International Telecommunication Union, Senior-Level, Mid-Level, Entry-Level United

  8. (IoT) Applications

    African Journals Online (AJOL)

    pc

    2018-03-05

    Mar 5, 2018 ... doi: http://dx.doi.org/10.4314/jfas.v10i4s.13 around you an ability to think, get connected, producing big data, analysing it and converting this manual information to automation seamlessly and consequently making homes.

  9. Education of information users and promotional operations of the branch information centre

    International Nuclear Information System (INIS)

    Kohoutova, J.

    1982-01-01

    The Nuclear Information Centre also operates in the field of education and publicity. It organizes seminars, symposia and exhibitions in Czechoslovakia and abroad and has processed handbooks for INIS output users. Working excursions are also organized to the Nuclear Information Centre. (M.D.)

  10. Automated transmission system operation and management : meeting stakeholder information needs

    Energy Technology Data Exchange (ETDEWEB)

    Peelo, D.F.; Toom, P.O. [British Columbia Hydro, Vancouver, BC (Canada)

    1998-12-01

    Information monitoring is considered to be the fundamental basis for moving beyond substation automation and into automated transmission system operation and management. Information monitoring was defined as the acquisition of data and processing the data into decision making. Advances in digital technology and cheaper, more powerful computing capability has made it possible to capture all transmission stakeholder needs in a shared and automated operation and management system. Recognizing that the key to success in the development of transmission systems is automation, BC Hydro has initiated a long-term research and development project to develop the structure and detail of transmission system automation. The involvement of partners, be they utility or equipment suppliers, is essential in order to deal with protocol and similar issues. 3 refs., 1 tab., 3 figs.

  11. Activity-Based Information Integrating the operations strategy

    Directory of Open Access Journals (Sweden)

    José Augusto da Rocha de Araujo

    2005-12-01

    Full Text Available In the globalized world, companies seek for new operations strategies to ensure world corporate success. This article analyzes how the cost management models – both traditional and activity-based, aid the planning and management of corporate globalized operations. The efficacy of the models application depends on their alignment with the competitive strategy. Companies must evaluate the nature of the competition and its competitive priorities; they should then define the necessary and sufficient dependence level on costs information. In this article, three dependence levels are presented: operational, decision support and strategic control. The result of the research shows the importance of alignment between the cost management model and the competitive strategy for corporate success, and confirms the adequacy of the activity-based costing model as a supporting tool for decision taking in a global strategy. Case studies in world class companies in Brazil are presented.

  12. Programming iOS 6

    CERN Document Server

    Neuburg, Matt

    2013-01-01

    Get a solid grounding in all the fundamentals of Cocoa Touch, and avoid problems during iPhone and iPad app development. With this revised and expanded edition, you'll dig into Cocoa and learn how to work effectively with Objective-C and Xcode. This book covers iOS 6 in a rigorous, orderly fashion-ideal whether you're approaching iOS for the first time or need a reference to bolster existing skills. Learn about features introduced with iOS 6, including Objective-C language advances, autosynthesis, autolayout, new view controller rotation rules, unwind segues, state restoration, styled text, and collection views. * Learn Objective-C language details and object-oriented programming concepts * Understand the anatomy of an Xcode project and all the stages of its lifecycle * Grasp key Cocoa concepts such as relationships between classes, receiving events, and model-view-controller architecture * Learn how views and layers are managed, drawn, composited, and animated * Become familiar with view controllers and thei...

  13. 75 FR 49943 - New Agency Information Collection Activity Under OMB Review: Pipeline System Operator Security...

    Science.gov (United States)

    2010-08-16

    ... INFORMATION CONTACT: Joanna Johnson, Office of Information Technology, TSA-11, Transportation Security... Collection Activity Under OMB Review: Pipeline System Operator Security Information AGENCY: Transportation... System Operator Security Information. Type of Request: New collection. OMB Control Number: Not yet...

  14. Secure Retrieval of FFTF Testing, Design, and Operating Information

    International Nuclear Information System (INIS)

    Butner, R. Scott; Wootan, David W.; Omberg, Ronald P.; Makenas, Bruce J.; Nielsen, Deborah

    2009-01-01

    One of the goals of the Advanced Fuel Cycle Initiative (AFCI) is to preserve the knowledge that has been gained in the United States on Liquid Metal Reactors (LMR). In addition, preserving LMR information and knowledge is part of a larger international collaborative activity conducted under the auspices of the International Atomic Energy Agency (IAEA). A similar program is being conducted for EBR-II at the Idaho Nuclear Laboratory (INL) and international programs are also in progress. Knowledge preservation at the FFTF is focused on the areas of design, construction, startup, and operation of the reactor. As the primary function of the FFTF was testing, the focus is also on preserving information obtained from irradiation testing of fuels and materials. This information will be invaluable when, at a later date, international decisions are made to pursue new LMRs. In the interim, this information may be of potential use for international exchanges with other LMR programs around the world. At least as important in the United States, which is emphasizing large-scale computer simulation and modeling, this information provides the basis for creating benchmarks for validating and testing these large scale computer programs. Although the preservation activity with respect to FFTF information as discussed below is still underway, the team of authors above is currently retrieving and providing experimental and design information to the LMR modeling and simulation efforts for use in validating their computer models. On the Hanford Site, the FFTF reactor plant is one of the facilities intended for decontamination and decommissioning consistent with the cleanup mission on this site. The reactor facility has been deactivated and is being maintained in a cold and dark minimal surveillance and maintenance mode until final decommissioning is pursued. In order to ensure protection of information at risk, the program to date has focused on sequestering and secure retrieval

  15. Strategic and operational information watch newsletter nr 3

    International Nuclear Information System (INIS)

    2017-04-01

    This newsletter proposes an overview of events related to security and defence issues in relationship with impacts of climate change. A first part reports a strategic watch which addresses news about the Paris agreement (negotiation in Bonn, statement of the Canadian minister of Defence, commitment by the Lebanese army to reduce its emissions), about the energy sector (the lowest level of oil discovery, partial privatisation of Saudi Aramco, and economic and energetic diversification of Saudi Arabia), and climate change as a source of tensions and collaborations. The second part reports an operational information watch which addresses new technologies and renewable energies (photovoltaic cells operating in the dark, waste energetic valorisation in field operations, the issue of energy security for US military allowances, use of drones for logistics, a Gripen fighter aircraft flies with bio-fuel) and proposes a health watch (consequences of UV exposure in field operations, impact of El Nino on cholera distribution in Africa, the ban of ragweed in France). The newsletter finally indicates some brief news, events and recent publications

  16. Implementing and operating the Hanford Environmental Information System (HEIS)

    International Nuclear Information System (INIS)

    Cowley, P.J.; Schwab, M.R.; Fox, R.D.

    1994-03-01

    In the process of performing environmental restoration at the 560-square mile Hanford Site in southeastern Washington State, vast amounts of scientific and technical data are being generated from sampling taking place all over the Site. This paper provides an overview of the lessons we have learned in designing, implementing, and putting into operation a computerized system named the Hanford Environmental Information System (HEIS), which is being used to manage the Site's environmental characterization sampling data. Topics discussed in this paper include helping the Site adapt to a data management culture, the advantages of electronic data over paper data, issues of data validation and defensibility, being a resource to the user community (including the regulatory community), managing and tracking data changes, integrating data from multiple programs, providing configuration control for data and software, getting priorities for software development, and developing a baseline for on-going funding to maintain the infrastructure for the information system

  17. Collaborative Operations for Personnel Recovery

    Science.gov (United States)

    2008-02-01

    framework of the NASA TLX will be used to discuss the implications of the Co-OPR system on workload. The NASA TLX is a subjective workload assessment tool...that allows users to perform subjective workload assessments on operator(s) working with various human- machine systems. NASA TLX is a multi...Bundy, A.), IOS Press. Tate, A. (2006) The Helpful Environment: distributed agents and services which cooperate, in "Cooperative Information Agents X

  18. U.S. Military Information Operations in Afghanistan: Effectiveness of Psychological Operations 2001-2010

    Science.gov (United States)

    2012-01-01

    cultural norms and sensibilities. To highlight the un-Islamic ideology and behavior of the terrorists, 4 Christopher N. Koontz , Enduring Voices: Oral...maintaining law and order at the local 57 Koontz , 2008, p. 363. 84 U.S. Military Information Operations in Afghanistan level, this presents a serious...theme. However, although 61 Koontz , 2008, p. 141. 62 Koontz , 2008, p. 141. 63 Joshua Partlow and Scott Wilson, “Karzai Rails Against Foreign Presence

  19. Construction site Voice Operated Information System (VOIS) test

    Science.gov (United States)

    Lawrence, Debbie J.; Hettchen, William

    1991-01-01

    The Voice Activated Information System (VAIS), developed by USACERL, allows inspectors to verbally log on-site inspection reports on a hand held tape recorder. The tape is later processed by the VAIS, which enters the information into the system's database and produces a written report. The Voice Operated Information System (VOIS), developed by USACERL and Automated Sciences Group, through a ESACERL cooperative research and development agreement (CRDA), is an improved voice recognition system based on the concepts and function of the VAIS. To determine the applicability of the VOIS to Corps of Engineers construction projects, Technology Transfer Test Bad (T3B) funds were provided to the Corps of Engineers National Security Agency (NSA) Area Office (Fort Meade) to procure and implement the VOIS, and to train personnel in its use. This report summarizes the NSA application of the VOIS to quality assurance inspection of radio frequency shielding and to progress payment logs, and concludes that the VOIS is an easily implemented system that can offer improvements when applied to repetitive inspection procedures. Use of VOIS can save time during inspection, improve documentation storage, and provide flexible retrieval of stored information.

  20. Securing IoT Devices at CERN

    CERN Multimedia

    CERN. Geneva

    2018-01-01

    CERN has more than 1000 Internet of Things (IoT) devices, which are connected to the office network. We have been doing the research to find all vulnerable IoT devices in CERN and mitigated them. We are currently working on detecting IoT devices automatically and, moreover, identifying the manufacturer, model and the running firmware version. This will help the CERN Computer Security Team to spot vulnerable devices and to show the security risks associated with them.

  1. Ergonomic design in the operating room: information technologies

    Science.gov (United States)

    Morita, Mark M.; Ratib, Osman

    2005-04-01

    The ergonomic design in the Surgical OR of information technology systems has been and continues to be a large problem. Numerous disparate information systems with unique hardware and display configurations create an environment similar to the chaotic environments of air traffic control. Patient information systems tend to show all available statistics making it difficult to isolate the key, relevant vitals for the patient. Interactions in this sterile environment are still being done with the traditional keyboard and mouse designed for cubicle office workflows. This presentation will address the shortcomings of the current design paradigm in the Surgical OR that relate to Information Technology systems. It will offer a perspective that addresses the ergonomic deficiencies and predicts how future technological innovations will integrate into this vision. Part of this vision includes a Surgical OR PACS prototype, developed by GE Healthcare Technologies, that addresses ergonomic challenges of PACS in the OR that include lack of portability, sterile field integrity, and UI targeted for diagnostic radiologists. GWindows (gesture control) developed by Microsoft Research and Voice command will allow for the surgeons to navigate and review diagnostic imagery without using the conventional keyboard and mouse that disrupt the integrity of the sterile field. This prototype also demonstrates how a wireless, battery powered, self contained mobile PACS workstation can be optimally positioned for a surgeon to reference images during an intervention as opposed to the current pre-operative review. Lessons learned from the creation of the Surgical OR PACS Prototype have demonstrated that PACS alone is not the end all solution in the OR. Integration of other disparate information systems and presentation of this information in simple, easy to navigate information packets will enable smoother interactions for the surgeons and other healthcare professionals in the OR. More intuitive

  2. Research on offense and defense technology for iOS kernel security mechanism

    Science.gov (United States)

    Chu, Sijun; Wu, Hao

    2018-04-01

    iOS is a strong and widely used mobile device system. It's annual profits make up about 90% of the total profits of all mobile phone brands. Though it is famous for its security, there have been many attacks on the iOS operating system, such as the Trident apt attack in 2016. So it is important to research the iOS security mechanism and understand its weaknesses and put forward targeted protection and security check framework. By studying these attacks and previous jailbreak tools, we can see that an attacker could only run a ROP code and gain kernel read and write permissions based on the ROP after exploiting kernel and user layer vulnerabilities. However, the iOS operating system is still protected by the code signing mechanism, the sandbox mechanism, and the not-writable mechanism of the system's disk area. This is far from the steady, long-lasting control that attackers expect. Before iOS 9, breaking these security mechanisms was usually done by modifying the kernel's important data structures and security mechanism code logic. However, after iOS 9, the kernel integrity protection mechanism was added to the 64-bit operating system and none of the previous methods were adapted to the new versions of iOS [1]. But this does not mean that attackers can not break through. Therefore, based on the analysis of the vulnerability of KPP security mechanism, this paper implements two possible breakthrough methods for kernel security mechanism for iOS9 and iOS10. Meanwhile, we propose a defense method based on kernel integrity detection and sensitive API call detection to defense breakthrough method mentioned above. And we make experiments to prove that this method can prevent and detect attack attempts or invaders effectively and timely.

  3. Augmented communication with haptic I/O in mobile devices

    OpenAIRE

    Haverinen, Laura

    2012-01-01

    Nonverbal communication is a very important part of face to face communication. Both explicit and implicit additions to verbal communication augment the information content of communication. Before telephones did not provide any means for adding nonverbal information to the communication, but now, as the technology has advanced, it is possible to start augmenting also the communication on the phone. Adding a haptic I/O device to a regular mobile phone opens possibilities to add value to commu...

  4. Photokeratoconjunctivitis Symptoms among Informal Welding Operators in North Samarinda, Indonesia

    Directory of Open Access Journals (Sweden)

    Iwan Muhamad Ramdan

    2017-08-01

    Sektor informal telah berkontribusi terhadap perekonomian nasional, namun praktik kesehatan dan keselamatan kerja pada sektor ini masih belum memuaskan. Salah satu usaha sektor informal yang banyak dijumpai di Samarinda Utara adalah usaha pengelasan dengan potensi bahaya utama paparan sinar ultraviolet yang dapat menyebabkan photokeratoconjunctivitis. Penelitian ini bertujuan menginvestigasi kejadian photokeratoconjunctivitis dan faktor yang memengaruhinya pada operator las informal di Kelurahan Samarinda Utara. Penelitian cross-sectional telah dilakukan terhadap 40 responden pada bulan Maret sampai November 2016. Pengumpulan data menggunakan UV detector meter, clamp meter, dan kuesioner. Analisis data menggunakan chi-square, Pearson’s correlation product moment, dan multiple linear regression. Lima puluh persen responden mengalami gejala photokeratoconjunctivitis. Alat pelindung diri (APD (p=0,004, durasi paparan UV (0,056, pengetahuan tentang kesehatan, dan keselamatan kerja (K3 (p=0,055 dan jumlah hari kerja (p=0,001 berhubungan signifikan dengan kejadian photokeratoconjunctivitis. Lokasi kerja (p=0,244, tingkat pendidikan (p=0,680, usia (0,167, intensitas radiasi UV (p=0,206, dan kuat arus las (p=0,085 tidak berhubungan dengan gejala photokeratoconjunctivitis. Simpulan, gejala photokeratoconjunctivitis dipengaruhi oleh penggunaan APD, durasi paparan UV, pengetahuan K3, dan jumlah hari kerja. Faktor yang paling dominan memengaruhi gejala photokeratoconjunctivitis adalah durasi paparan UV.

  5. Defense Waste Processing Facility staged operations: environmental information document

    International Nuclear Information System (INIS)

    1981-11-01

    Environmental information is presented relating to a staged version of the proposed Defense Waste Processing Facility (DWPF) at the Savannah River Plant. The information is intended to provide the basis for an Environmental Impact Statement. In either the integral or the staged design, the DWPF will convert the high-level waste currently stored in tanks into: a leach-resistant form containing about 99.9% of all the radioactivity, and a residual, slightly contaminated salt, which is disposed of as saltcrete. In the first stage of the staged version, the insoluble sludge portion of the waste and the long lived radionuclides contained therein will be vitrified. The waste glass will be sealed in canisters and stored onsite until shipped to a Federal repository. In the second stage, the supernate portion of the waste will be decontaminated by ion exchange. The recovered radionuclides will be transferred to the Stage 1 facility, and mixed with the sludge feed before vitrification. The residual, slightly contaminated salt solution will be mixed with Portland cement to form a concrete product (saltcrete) which will be buried onsite in an engineered landfill. This document describes the conceptual facilities and processes for producing glass waste and decontaminated salt. The environmental effects of facility construction, normal operations, and accidents are then presented. Descriptions of site and environs, alternative sites and waste disposal options, and environmental consultations and permits are given in the base Environmental Information Document

  6. Research and design of smart grid monitoring control via terminal based on iOS system

    Science.gov (United States)

    Fu, Wei; Gong, Li; Chen, Heli; Pan, Guangji

    2017-06-01

    Aiming at a series of problems existing in current smart grid monitoring Control Terminal, such as high costs, poor portability, simple monitoring system, poor software extensions, low system reliability when transmitting information, single man-machine interface, poor security, etc., smart grid remote monitoring system based on the iOS system has been designed. The system interacts with smart grid server so that it can acquire grid data through WiFi/3G/4G networks, and monitor each grid line running status, as well as power plant equipment operating conditions. When it occurs an exception in the power plant, incident information can be sent to the user iOS terminal equipment timely, which will provide troubleshooting information to help the grid staff to make the right decisions in a timely manner, to avoid further accidents. Field tests have shown the system realizes the integrated grid monitoring functions, low maintenance cost, friendly interface, high security and reliability, and it possesses certain applicable value.

  7. Clear as MUD: Generating, Validating and Applying IoT Behaviorial Profiles (Technical Report)

    OpenAIRE

    Hamza, Ayyoob; Ranathunga, Dinesha; Gharakheili, H. Habibi; Roughan, Matthew; Sivaraman, Vijay

    2018-01-01

    IoT devices are increasingly being implicated in cyber-attacks, driving community concern about the risks they pose to critical infrastructure, corporations, and citizens. In order to reduce this risk, the IETF is pushing IoT vendors to develop formal specifications of the intended purpose of their IoT devices, in the form of a Manufacturer Usage Description (MUD), so that their network behavior in any operating environment can be locked down and verified rigorously. This paper aims to assist...

  8. Benefits of Parallel I/O in Ab Initio Nuclear Physics Calculations

    International Nuclear Information System (INIS)

    Laghave, Nikhil; Sosonkina, Masha; Maris, Pieter; Vary, James P.

    2009-01-01

    Many modern scientific applications rely on highly parallel calculations, which scale to 10's of thousands processors. However, most applications do not concentrate on parallelizing input/output operations. In particular, sequential I/O has been identified as a bottleneck for the highly scalable MFDn (Many Fermion Dynamics for nuclear structure) code performing ab initio nuclear structure calculations. In this paper, we develop interfaces and parallel I/O procedures to use a well-known parallel I/O library in MFDn. As a result, we gain efficient input/output of large datasets along with their portability and ease of use in the downstream processing.

  9. iOS Game Development using SpriteKit Framework with Swift Programming Language

    OpenAIRE

    Gurung, Lal

    2016-01-01

    iOS is a mobile operating system for Apple manufactured phones and tablets. Mobile Gaming Industries are growing very fast, and compatibility with iOS is becoming very popular among game developers. The aim of this Bachelor’s thesis was to find the best available game development tools for iOS platform. The 2D game named Lapland was developed using Apple’s own native framework, SpriteKit. The game was written with the SpriteKit programming language. The combination of SpriteKit and Swift...

  10. Cassini-VIMS at Jupiter: Solar occultation measurements using Io

    Science.gov (United States)

    Formisano, V.; D'Aversa, E.; Bellucci, G.; Baines, K.H.; Bibring, J.-P.; Brown, R.H.; Buratti, B.J.; Capaccioni, F.; Cerroni, P.; Clark, R.N.; Coradini, A.; Cruikshank, D.P.; Drossart, P.; Jaumann, R.; Langevin, Y.; Matson, D.L.; McCord, T.B.; Mennella, V.; Nelson, R.M.; Nicholson, P.D.; Sicardy, B.; Sotin, Christophe; Chamberlain, M.C.; Hansen, G.; Hibbits, K.; Showalter, M.; Filacchione, G.

    2003-01-01

    We report unusual and somewhat unexpected observations of the jovian satellite Io, showing strong methane absorption bands. These observations were made by the Cassini VIMS experiment during the Jupiter flyby of December/January 2000/2001. The explanation is straightforward: Entering or exiting from Jupiter's shadow during an eclipse, Io is illuminated by solar light which has transited the atmosphere of Jupiter. This light, therefore becomes imprinted with the spectral signature of Jupiter's upper atmosphere, which includes strong atmospheric methane absorption bands. Intercepting solar light refracted by the jovian atmosphere, Io essentially becomes a "miffor" for solar occultation events of Jupiter. The thickness of the layer where refracted solar light is observed is so large (more than 3000 km at Io's orbit), that we can foresee a nearly continuous multi-year period of similar events at Saturn, utilizing the large and bright ring system. During Cassini's 4-year nominal mission, this probing tecnique should reveal information of Saturn's atmosphere over a large range of southern latitudes and times. ?? 2003 Elsevier Inc. All rights reserved.

  11. UbiCompass: An IoT Interaction Concept

    Directory of Open Access Journals (Sweden)

    Günter Alce

    2018-01-01

    Full Text Available Lately, different wearable form factors have reached the consumer domain. Wearables enable at-a-glance access to information and can continually sense the surrounding environment. Internet of Things (IoT researchers have focused on the main enabling factors: the integration of several technologies and communication solutions. Less effort has been devoted to exploring how not-so-tech-savvy end users can discover and directly interact with the numerous connected things predicted by the IoT vision. This paper presents a novel IoT interaction concept called UbiCompass. A functional, smartwatch face prototype of the UbiCompass was developed and integrated with an existing smart home system, in which five different connected devices could be controlled using simple interaction. It was then compared to a traditional smartphone mobile application in a controlled experiment. The results show statistically significant differences in favor of the proposed concept. This highlights the potential the UbiCompass has as an IoT interaction concept.

  12. An Information Management System for CHIKYU Operation and its Future

    Science.gov (United States)

    Kuramoto, S.; Matsuda, S.; Ito, H.

    2005-12-01

    The CDEX (Center for Deep Earth Exploration, JAMSTEC) is an implementing organization of a riser drilling vessel, CHIKYU ("Earth"). CHIKYU has a large capability to produce a wide variety of data, core measurement data, logging data, mud logging data, cuttings data and monitoring data in boreholes, etc. Also CDEX conducts site survey for safety drilling and publication before and after cruises. It is critical that these diverse data be managed using a unified, coherent method, and that they be organized and provided to users in an intuitive, clearly understandable way that reflects the aims and underlying philosophies of the IODP and JAMSTEC. It is crucial that these data are accessible to users through an integrated interface in which all data formats, management tools, and procedures are standardized. Meeting these goals will assure total usability for scientists, administrators, and the public, from data creation to uploading and cataloging, to end use and publication. CDEX is developing an integrated information management system, call "SIO7" (Scientific Information from 7 Oceans) for CHIKYU operation, and would like to extend to adopt various information handling systems in geosciences. The SIO7 composed of 2 major systems, J-CORES (JAMSTEC Core Systematics) and DEXIS (Deep Earth Exploration Information System) (see http://sio7.jamstec.go.jp/ for the details). J-CORES is a database system designated to manage all aspects of core data. The system is modeled on the JANUS system developed by and for ODP, but implements an extended, somewhat modified data model. The functions that support onboard and real time data input operations have also been strengthened. A variety of data visualization and visual core description functions have been added, and data loading from those applications has been automated, making the system as a whole both powerful and easy to use. On the other hand, DEXIS is developed based on the combination and integration of existing off

  13. Hanford Environmental Information System (HEIS) Operator`s Manual. Volume 1

    Energy Technology Data Exchange (ETDEWEB)

    Schreck, R.I.

    1991-10-01

    The Hanford Environmental Information System (HEIS) is a consolidated set of automated resources that effectively manage the data gathered during environmental monitoring and restoration of the Hanford Site. The HEIS includes an integrated database that provides consistent and current data to all users and promotes sharing of data by the entire user community. This manual describes the facilities available to the operational user who is responsible for data entry, processing, scheduling, reporting, and quality assurance. A companion manual, the HEIS User`s Manual, describes the facilities available-to the scientist, engineer, or manager who uses the system for environmental monitoring, assessment, and restoration planning; and to the regulator who is responsible for reviewing Hanford Site operations against regulatory requirements and guidelines.

  14. The Integration of DCS I/O to an Existing PLC

    Science.gov (United States)

    Sadhukhan, Debashis; Mihevic, John

    2013-01-01

    At the NASA Glenn Research Center (GRC), Existing Programmable Logic Controller (PLC) I/O was replaced with Distributed Control System (DCS) I/O, while keeping the existing PLC sequence Logic. The reason for integration of the PLC logic and DCS I/O, along with the evaluation of the resulting system is the subject of this paper. The pros and cons of the old system and new upgrade are described, including operator workstation screen update times. Detail of the physical layout and the communication between the PLC, the DCS I/O and the operator workstations are illustrated. The complex characteristics of a central process control system and the plan to remove the PLC processors in future upgrades is also discussed.

  15. EDGE TECHNOLOGIES IN IoT AND APPLICATION SCENARIO OF RFID BASED IoT

    OpenAIRE

    Dharam Gami *, Asst. Prof. Dhaval Nimavat, Asst. Prof. Shubham Sharma

    2016-01-01

    Internet of Things possesses the power to change the era. IoT will offer an advance connectivity between objects which will change the face of machine-to-machine communication. IoT will connect autonomous systems, devices and heterogeneous machines and make them communicate without human interactions. Many technologies will play significant role in IoT implementation. In this paper, we aim to describe the candidate of edge technologies in IoT and demonstrate how RFID based IoT system will loo...

  16. IoT Architectural Framework: Connection and Integration Framework for IoT Systems

    OpenAIRE

    Uviase, Onoriode; Kotonya, Gerald

    2018-01-01

    The proliferation of the Internet of Things (IoT) has since seen a growing interest in architectural design and adaptive frameworks to promote the connection between heterogeneous IoT devices and IoT systems. The most widely favoured software architecture in IoT is the Service Oriented Architecture (SOA), which aims to provide a loosely coupled systems to leverage the use and reuse of IoT services at the middle-ware layer, to minimise system integration problems. However, despite the flexibil...

  17. Target Bosnia: Integrating Information Activities in Peace Operations. NATO-Led Operations in Bosnia-Herzegovina, December 1995-1997

    National Research Council Canada - National Science Library

    Siegel, Pascale C

    1998-01-01

    This monograph examines the role of information in Peace Support Operations (PSO) and its impact on command and control through the prism of NATO-led operations in Bosnia-Herzegovina from December 1995 into 1997...

  18. Sesame IO Library User Manual Version 8

    Energy Technology Data Exchange (ETDEWEB)

    Abhold, Hilary [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Young, Ginger Ann [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-05-15

    This document is a user manual for SES_IO, a low-level library for reading and writing sesame files. The purpose of the SES_IO library is to provide a simple user interface for accessing and creating sesame files that does not change across sesame format type (such as binary, ascii, and xml).

  19. A performance analysis of advanced I/O architectures for PC-based network file servers

    Science.gov (United States)

    Huynh, K. D.; Khoshgoftaar, T. M.

    1994-12-01

    In the personal computing and workstation environments, more and more I/O adapters are becoming complete functional subsystems that are intelligent enough to handle I/O operations on their own without much intervention from the host processor. The IBM Subsystem Control Block (SCB) architecture has been defined to enhance the potential of these intelligent adapters by defining services and conventions that deliver command information and data to and from the adapters. In recent years, a new storage architecture, the Redundant Array of Independent Disks (RAID), has been quickly gaining acceptance in the world of computing. In this paper, we would like to discuss critical system design issues that are important to the performance of a network file server. We then present a performance analysis of the SCB architecture and disk array technology in typical network file server environments based on personal computers (PCs). One of the key issues investigated in this paper is whether a disk array can outperform a group of disks (of same type, same data capacity, and same cost) operating independently, not in parallel as in a disk array.

  20. Potenciál IoT v Smart city

    OpenAIRE

    Pavlíček, Tomáš

    2016-01-01

    The aim of this masters thesis is to identify, in which phase of adoption of Internet of Things (IoT) application areas of concept Smart City are nowadays Czech regional cities, what is their outlook to 2025 and also identify in which dimensions of concept Smart city, supported by IoT technologies, perceive Czech regional cities the greatest potential. Based on information obtained from the studied materials, the concept of Internet of Things (IoT) is described, along with a detailed descript...

  1. Does Io's ionosphere influence Jupiter's radio bursts.

    Science.gov (United States)

    Webster, D. L.; Alksne, A. Y.; Whitten, R. C.

    1972-01-01

    Goldreich and Lynden-Bell's theory of Jupiter's Io-correlated decametric radiation sets a lower limit to Io's conductivity, high enough to carry the current associated with the radiated power. Dermott's analysis of conductivities of rocks and ice shows no such conductivity at Io's temperature. However, we show that if Io has even a small atmosphere, say of methane as suggested by Binder and Cruikshank, or of argon or nitrogen, it will have an ionosphere with adequate conductivity to meet the above criterion. A requirement for higher conductivity was found by Goldreich and Lynden-Bell on the basis of motion of magnetic lines past Io. This requirement appears to us unnecessary in view of experiments which prove that motion of the lines is not the source of the electromotance.

  2. A Resource Service Model in the Industrial IoT System Based on Transparent Computing.

    Science.gov (United States)

    Li, Weimin; Wang, Bin; Sheng, Jinfang; Dong, Ke; Li, Zitong; Hu, Yixiang

    2018-03-26

    The Internet of Things (IoT) has received a lot of attention, especially in industrial scenarios. One of the typical applications is the intelligent mine, which actually constructs the Six-Hedge underground systems with IoT platforms. Based on a case study of the Six Systems in the underground metal mine, this paper summarizes the main challenges of industrial IoT from the aspects of heterogeneity in devices and resources, security, reliability, deployment and maintenance costs. Then, a novel resource service model for the industrial IoT applications based on Transparent Computing (TC) is presented, which supports centralized management of all resources including operating system (OS), programs and data on the server-side for the IoT devices, thus offering an effective, reliable, secure and cross-OS IoT service and reducing the costs of IoT system deployment and maintenance. The model has five layers: sensing layer, aggregation layer, network layer, service and storage layer and interface and management layer. We also present a detailed analysis on the system architecture and key technologies of the model. Finally, the efficiency of the model is shown by an experiment prototype system.

  3. Lack of visible change around active hotspots on Io

    Science.gov (United States)

    1996-01-01

    Detail of changes around two hotspots on Jupiter's moon Io as seen by Voyager 1 in April 1979 (left) and NASA's Galileo spacecraft on September 7th, 1996 (middle and right). The right frame was created with images from the Galileo Solid State Imaging system's near-infrared (756 nm), green, and violet filters. For better comparison, the middle frame mimics Voyager colors. The calderas at the top and at the lower right of the images correspond to the locations of hotspots detected by the Near Infrared Mapping Spectrometer aboard the Galileo spacecraft during its second orbit. There are no significant morphologic changes around these hot calderas; however, the diffuse red deposits, which are simply dark in the Voyager colors, appear to be associated with recent and/or ongoing volcanic activity. The three calderas range in size from approximately 100 kilometers to approximately 150 kilometers in diameter. The caldera in the lower right of each frame is named Malik. North is to the top of all frames.The Jet Propulsion Laboratory, Pasadena, CA manages the Galileo mission for NASA's Office of Space Science, Washington, DC. JPL is an operating division of California Institute of Technology (Caltech).This image and other images and data received from Galileo are posted on the World Wide Web, on the Galileo mission home page at URL http://galileo.jpl.nasa.gov. Background information and educational context for the images can be found at URL http://www.jpl.nasa.gov/galileo/sepo

  4. A federated capability-based access control mechanism for internet of things (IoTs)

    Science.gov (United States)

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-05-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.

  5. Wind Information Uplink to Aircraft Performing Interval Management Operations

    Science.gov (United States)

    Ahmad, Nashat N.; Barmore, Bryan E.; Swieringa, Kurt A.

    2016-01-01

    Interval Management (IM) is an ADS-B-enabled suite of applications that use ground and flight deck capabilities and procedures designed to support the relative spacing of aircraft (Barmore et al., 2004, Murdoch et al. 2009, Barmore 2009, Swieringa et al. 2011; Weitz et al. 2012). Relative spacing refers to managing the position of one aircraft to a time or distance relative to another aircraft, as opposed to a static reference point such as a point over the ground or clock time. This results in improved inter-aircraft spacing precision and is expected to allow aircraft to be spaced closer to the applicable separation standard than current operations. Consequently, if the reduced spacing is used in scheduling, IM can reduce the time interval between the first and last aircraft in an overall arrival flow, resulting in increased throughput. Because IM relies on speed changes to achieve precise spacing, it can reduce costly, low-altitude, vectoring, which increases both efficiency and throughput in capacity-constrained airspace without negatively impacting controller workload and task complexity. This is expected to increase overall system efficiency. The Flight Deck Interval Management (FIM) equipment provides speeds to the flight crew that will deliver them to the achieve-by point at the controller-specified time, i.e., assigned spacing goal, after the target aircraft crosses the achieve-by point (Figure 1.1). Since the IM and target aircraft may not be on the same arrival procedure, the FIM equipment predicts the estimated times of arrival (ETA) for both the IM and target aircraft to the achieve-by point. This involves generating an approximate four-dimensional trajectory for each aircraft. The accuracy of the wind data used to generate those trajectories is critical to the success of the IM operation. There are two main forms of uncertainty in the wind information used by the FIM equipment. The first is the accuracy of the forecast modeling done by the weather

  6. Strategy Planning Visualization Tool (SPVT) for the Air Operations Center (AOC) Volume I: SPVT Summary and COA Sketch

    Science.gov (United States)

    2009-12-01

    communication events to a specific team member or device, the time to create a product, or a planner’s workload via the NASA TLX . Qualitative metrics...HPW/RHXB, Commander’s Predictive Environment program – SMART), IWPC (GDAIS), Capt. DuBose and Mr. Matt Trippy ESC 950th ELSG Joint IO Planning...primary visualization and information components unique to GEM-S include Operations, Activities & Actions (OAA), Lines of Effects (LOE), IO Assessment

  7. 78 FR 77484 - Extension of Agency Information Collection Activity Under OMB Review: Pipeline System Operator...

    Science.gov (United States)

    2013-12-23

    ... Officer, Office of Information Technology (OIT), TSA-11, Transportation Security Administration, 601 South... Information Collection Activity Under OMB Review: Pipeline System Operator Security Information AGENCY... Transportation Security Administration (TSA) has forwarded the Information Collection Request (ICR), Office of...

  8. 76 FR 72243 - Proposed Information Collection (Operation Enduring Freedom/Operation Iraqi Freedom Veterans...

    Science.gov (United States)

    2011-11-22

    ... (Operation Enduring Freedom/ Operation Iraqi Freedom Veterans Health Needs Assessment) Activity; Comment... Operation Enduring Freedom/ Operation Iraqi Freedom veterans and their families. DATES: Written comments and...: Operation Enduring Freedom/Operation Iraqi Freedom Veterans Health Needs Assessment, VA Form 10-21091. OMB...

  9. Information Operations - Analysis Support and Capability Requirements (Operations d'information - Soutien a l'analyse et exigences de capacites) (CD-ROM)

    National Research Council Canada - National Science Library

    2006-01-01

    ...: The focus of the study "Information Operations - Analysis Support and Capability Requirements" undertaken by the RTO Task Group SAS-057 was to provide recommendations to improve analysis support...

  10. International Organizations (IOs), Epistemic Tools of Influence, and the Colonial Geopolitics of Knowledge Production in Higher Education Policy

    Science.gov (United States)

    Shahjahan, Riyad A.

    2016-01-01

    While other scholars have analyzed the way that international organizations (IOs) in higher education policy may contribute to neocolonial domination, this paper illuminates not only on "how" IOs' epistemic activities promulgate one-size fit all solutions, but centers the colonial structures of knowledge/power that inform the…

  11. Semantic Description of IoT Security for Smart Grid

    OpenAIRE

    Ayele, Getinet

    2017-01-01

    Master's thesis Information- and communication technology IKT590 - University of Agder 2017 This research work proposed, developed and evaluated IoT Security ontology for smart home energy management system (SHEMS) in smart grids. The ontology description includes infrastructure, attacks, vulnerabilities and counter measures for the main components of SHEMS such as Smart Meter, Smart Appliance, Home Gateway, and Billing data. The ontology extends the SAREF energy management ontology with s...

  12. Seedbed based on IoT: A Case Study

    OpenAIRE

    J. Kalathas; D.V. Bandekas; A. Kosmidis; V. Kanakaris

    2016-01-01

    Nowadays, the Wireless Sensors Network (WSN) and the Internet of Things (IOT) are widely used in providing decision support systems which solve many problems in the real-world. This paper presents IoT as the best way to solve the agricultural problems, related to seedbed resources optimization, decision making support and seed breeding monitoring. This case study provides real-time information about the seedbed that will help agriculturists make the right decisions during the seed...

  13. Strategic and operational information watch newsletter nr 2

    International Nuclear Information System (INIS)

    2017-02-01

    This newsletter proposes an overview of events related to security and defence issues in relationship with impacts of climate change. A first part reports a strategic watch which addresses news about the responsibility of climate changes in the emergence or aggravation of some present crisis, about what is going on in the USA in relationship with climate and defence issues (decisions by Trump, statement of the Secretary of Defence, influence of the political context), about the energy sector (instability of the oil market, the international role of India in the international climate and energy policy), and about international negotiations on climate. The second part reports an operational information watch addresses new technologies and renewable energies, and issues related to the vulnerability, protection and adaptation of infrastructures and equipment, and a health watch (soldier training in hot and wet environment, drought as a factor of Nile fever epidemic, climate changes and always higher risks for human health in Europe). The newsletter finally indicates some brief news, events and recent publications

  14. Strategic and operational information watch newsletter nr 1

    International Nuclear Information System (INIS)

    2016-12-01

    This newsletter proposes an overview of events related to security and defence issues in relationship with impacts of climate change. A first part reports a strategic watch which addresses the following topics: the environment taken into account by the International Criminal Court, impacts of climate change on tensions about rural estate in Africa, resolution of the European Parliament on the European Union of Defence, environmental and energy strategy of the Danish Ministry of Defence, COP22 in Marrakech, and so on. The second part reports an operational information watch addresses the threat on the US DoD environmental agenda by the new Trump administration, the adaptation of US forces to climate changes, the threat of climate change on US DoD infrastructures, a US base self-sufficient in energy, NATO actions for energy efficiency, thermal regulation improvement for soldiers, impact of El Nino on the propagation of the Zika virus, launching of the Lancet countdown. The newsletter finally indicates some brief news, events and recent publications

  15. Operational Leadership in the Information Age: A New Model

    National Research Council Canada - National Science Library

    Monis, Michael

    2000-01-01

    This report examines the effects of significant trends in the operational environment to arrive at a clearer picture of the evolving leadership challenges operational commanders face today and in the...

  16. 14 CFR 91.503 - Flying equipment and operating information.

    Science.gov (United States)

    2010-01-01

    ... Turbine-Powered Multiengine Airplanes and Fractional Ownership Program Aircraft § 91.503 Flying equipment...) Emergency operation of fuel, hydraulic, electrical, and mechanical systems. (2) Emergency operation of...

  17. A Dynamic Processing System for Sensor Data in IoT

    OpenAIRE

    Li, Minbo; Liu, Yanling; Cai, Yuanfeng

    2015-01-01

    With the development of the Internet of Things (IoT for short), innumerable Wireless Sensor Networks (WSNs) are deployed to capture the information of environmental status in the surrounding physical environment. The data from WSNs, called sensor data, are generated in high frequency. Similar to data of other open-loop applications, for example, network monitoring data, sensor data are heterogeneous, redundant, real-time, massive, and streaming. Hence, sensor data cannot be treated as the IoT...

  18. A Value Function Approach to Information Operations MOE's: A Preliminary Study

    National Research Council Canada - National Science Library

    Doyle, Michael

    1997-01-01

    A value focused thinking approach is applied to information operations. A preliminary value hierarchy for information operations is constructed by extracting the values of senior military leadership from existing doctrine...

  19. Unit information system operational displays for VVER-1000 reactors

    International Nuclear Information System (INIS)

    Anikanov, S.S.; Carrera, J.P.; Gordon, P.

    1997-01-01

    The role of high level operational displays is explained as well as the principles of the design of such displays. The tasks of WWER operating personnel are described and the support provided by operational displays is highlighted. The architecture of the displays is also dealt with. (A.K.)

  20. 30 CFR 778.11 - Providing applicant and operator information.

    Science.gov (United States)

    2010-07-01

    ... operator, if different from the applicant. (4) Each business entity in the applicant's and operator's organizational structure, up to and including the ultimate parent entity of the applicant and operator; for every... are corporations, partnerships, associations, sole proprietorships, or other business entities; (2...

  1. EVIO - A lightweight object-oriented I/O package

    International Nuclear Information System (INIS)

    Wolin, E.; Abbott, D.; Gurjyan, V.; Heyes, G.; Jastrzembski, E.; Lawrence, D.; Timmer, C.

    2008-01-01

    The EVIO package implements I/O between disk and an in-memory hierarchical object tree. Tree nodes are either container nodes, holding other nodes, or leaf nodes, containing any amount of data of a single type (int64 t ,..., int8 t , float, double, and string). Trees can easily be constructed using factory methods and stream operators; queried using STL-like algorithms, function object, etc; or modified using tree or node methods. The tree logically maps to XML, and utilities exist to transform between binary and ASCII XML formats. The binary representation is compact, I/O is simple and efficient, and endian conversions are handled automatically. EVIO will be used by the next generation of experiments at Jefferson Lab.

  2. H-infty Control of systems with multiple i/o delays

    NARCIS (Netherlands)

    Agoes Ariffin Moelja, A.A.; Meinsma, Gjerrit; Mirkin, Leonid

    2003-01-01

    In this paper the standard (four-block) H-infty control problem for systems with multiple i/o delays in the feedback loop is studied. The central idea is to see the multiple delay operator as a special series connection of elementary delay operators, called the adobe delay operators. The adobe delay

  3. The Role of Physical Layer Security in IoT: A Novel Perspective

    Directory of Open Access Journals (Sweden)

    Tommaso Pecorella

    2016-08-01

    Full Text Available This paper deals with the problem of securing the configuration phase of an Internet of Things (IoT system. The main drawbacks of current approaches are the focus on specific techniques and methods, and the lack of a cross layer vision of the problem. In a smart environment, each IoT device has limited resources and is often battery operated with limited capabilities (e.g., no keyboard. As a consequence, network security must be carefully analyzed in order to prevent security and privacy issues. In this paper, we will analyze the IoT threats, we will propose a security framework for the device initialization and we will show how physical layer security can effectively boost the security of IoT systems.

  4. From BPM to IoT

    OpenAIRE

    Cherrier , Sylvain; Deshpande , Varun

    2017-01-01

    International audience; IoT’s presence is increasingly felt. There are already more connected devices to the internet than total human population and sales are starting to rise. As there is extensive research ongoing in order to propose a global architecture to build IoT applications, the domain will rise as soon as a common solution will be widespread. Further, we would need to integrate IoT applications into the legacy data processing solutions. Business Process Model, for example, is a com...

  5. Human‐Centric IoT Networks

    DEFF Research Database (Denmark)

    Mihovska, Albena Dimitrova; Prasad, Ramjee; Pejanovic, Milica

    2017-01-01

    The current Internet of things (IoT) concept is characterized with billions and billions of devices interworking through a myriad of technologies for the delivery of smart personalized services and applications. At the center of these is the human user who drives his/her own interconnected cluster....... This concept has also been introduced elsewhere as “human center sensing (HCS).” The vision pushed by the authors of this chapter for the IoT beyond 2050 is one of the large‐scale and dense HCS connectivities, the complexity of which can be used to extract new IoT value proposition....

  6. Multiscale periodic structure in the Io wake

    Energy Technology Data Exchange (ETDEWEB)

    Smith, P R; Wright, A N

    1989-06-08

    The decametric radio emissions from Jupiter are known to be influenced by the Galilean satellite Io. It is believed that the structure in these emissions is associated with the Alfven-wave wake downstream of Io. However, recent studies have shown that the structure of the wake cannot be as simple as originally thought. Here we present preliminary results from an eigenmode synthesis of the Alfven waves launched by Io, and find that several important periodicities emerge. Observations of the decametric emissions reveal fine, medium-and large-scale structure. The simulation we present here can provide structure on each of these scales, unlike earlier models. (author).

  7. IoT-based user-driven service modeling environment for a smart space management system.

    Science.gov (United States)

    Choi, Hoan-Suk; Rhee, Woo-Seop

    2014-11-20

    The existing Internet environment has been extended to the Internet of Things (IoT) as an emerging new paradigm. The IoT connects various physical entities. These entities have communication capability and deploy the observed information to various service areas such as building management, energy-saving systems, surveillance services, and smart homes. These services are designed and developed by professional service providers. Moreover, users' needs have become more complicated and personalized with the spread of user-participation services such as social media and blogging. Therefore, some active users want to create their own services to satisfy their needs, but the existing IoT service-creation environment is difficult for the non-technical user because it requires a programming capability to create a service. To solve this problem, we propose the IoT-based user-driven service modeling environment to provide an easy way to create IoT services. Also, the proposed environment deploys the defined service to another user. Through the personalization and customization of the defined service, the value and dissemination of the service is increased. This environment also provides the ontology-based context-information processing that produces and describes the context information for the IoT-based user-driven service.

  8. Enhancing Privacy in Wearable IoT through a Provenance Architecture

    Directory of Open Access Journals (Sweden)

    Richard K. Lomotey

    2018-04-01

    Full Text Available The Internet of Things (IoT is inspired by network interconnectedness of humans, objects, and cloud services to facilitate new use cases and new business models across multiple enterprise domains including healthcare. This creates the need for continuous data streaming in IoT architectures which are mainly designed following the broadcast model. The model facilitates IoT devices to sense and deliver information to other nodes (e.g., cloud, physical objects, etc. that are interested in the information. However, this is a recipe for privacy breaches since sensitive data, such as personal vitals from wearables, can be delivered to undesired sniffing nodes. In order to protect users’ privacy and manufacturers’ IP, as well as detecting and blocking malicious activity, this research paper proposes privacy-oriented IoT architecture following the provenance technique. This ensures that the IoT data will only be delivered to the nodes that subscribe to receive the information. Using the provenance technique to ensure high transparency, the work is able to provide trace routes for digital audit trail. Several empirical evaluations are conducted in a real-world wearable IoT ecosystem to prove the superiority of the proposed work.

  9. Enabling Large-Scale IoT-Based Services through Elastic Publish/Subscribe.

    Science.gov (United States)

    Vavassori, Sergio; Soriano, Javier; Fernández, Rafael

    2017-09-19

    In this paper, we report an algorithm that is designed to leverage the cloud as infrastructure to support Internet of Things (IoT) by elastically scaling in/out so that IoT-based service users never stop receiving sensors' data. This algorithm is able to provide an uninterrupted service to end users even during the scaling operation since its internal state repartitioning is transparent for publishers or subscribers; its scaling operation is time-bounded and depends only on the dimension of the state partitions to be transmitted to the different nodes. We describe its implementation in E-SilboPS, an elastic content-based publish/subscribe (CBPS) system specifically designed to support context-aware sensing and communication in IoT-based services. E-SilboPS is a key internal asset of the FIWARE IoT services enablement platform, which offers an architecture of components specifically designed to capture data from, or act upon, IoT devices as easily as reading/changing the value of attributes linked to context entities. In addition, we discuss the quantitative measurements used to evaluate the scale-out process, as well as the results of this evaluation. This new feature rounds out the context-aware content-based features of E-SilboPS by providing, for example, the necessary middleware for constructing dashboards and monitoring panels that are capable of dynamically changing queries and continuously handling data in IoT-based services.

  10. 23 CFR 752.8 - Privately operated information centers and systems.

    Science.gov (United States)

    2010-04-01

    ... 23 Highways 1 2010-04-01 2010-04-01 false Privately operated information centers and systems. 752... may permit privately operated information centers and systems which conform with the standards of this... AND ENVIRONMENT LANDSCAPE AND ROADSIDE DEVELOPMENT § 752.8 Privately operated information centers and...

  11. Rojas novada tūrisma iOS lietotnes izveide

    OpenAIRE

    Baurovskis, Armands

    2013-01-01

    Kvalifikācijas darbā – „Rojas novada tūrisma iOS lietotnes izveide” ir izstrādāta Rojas novada tūrisma lietotne iOS operētājsistēmai – „Roja Travel Guide”. Izstrāde tika veikta ar spējo programmatūras izstrādes metodi. Lietotne nodrošina informāciju divās valodās – latviešu un angļu – par Rojas novada tūrisma objektiem, kā arī ļauj lasīt jaunākās ziņas, kas ir saistītas ar novadu. Lietotne ir paredzēta tūristiem un vietējiem iedzīvotājiem. Lietotne strādā pilnvērtīgi uz visiem iPhone un iPad ...

  12. Aplikasi Rekomendasi Pola Makan Berbasis iOS

    Directory of Open Access Journals (Sweden)

    Afan Galih Salman

    2012-12-01

    Full Text Available The goal for implementing this system is to help users manage and track history about their eat pattern, choose proper food for body’s need, and pick restaurants. Methodology used for this research contains three parts, which is analysis, design, and literature study. In requirement analysis, we do some interview withnutritionist and food provider, analysis iOS user, compare with same kind of application, and identify components that we need. In design method, we use Unified Modelling Language approach, ERD design, and user interface design. The result is a food planning mobile application with iOS platform. This application canhelp user manage and track their eat pattern, help user choose balanced food that suitable for their body, and inform user where they can get food they plan to eat.

  13. Understanding IoT systems: a life cycle approach

    NARCIS (Netherlands)

    Rahman, Leila Fatmasari; Ozcelebi, Tanir; Lukkien, Johan

    2018-01-01

    Internet of Things (IoT) systems and the corresponding network architectures are complex due to distributed services on many IoT devices collaboratively fulfilling common goals of IoT applications. System requirements for different types of IoT application domains are still not well-established. The

  14. Distributed service-based approach for sensor data fusion in IoT environments.

    Science.gov (United States)

    Rodríguez-Valenzuela, Sandra; Holgado-Terriza, Juan A; Gutiérrez-Guerrero, José M; Muros-Cobos, Jesús L

    2014-10-15

    The Internet of Things (IoT) enables the communication among smart objects promoting the pervasive presence around us of a variety of things or objects that are able to interact and cooperate jointly to reach common goals. IoT objects can obtain data from their context, such as the home, office, industry or body. These data can be combined to obtain new and more complex information applying data fusion processes. However, to apply data fusion algorithms in IoT environments, the full system must deal with distributed nodes, decentralized communication and support scalability and nodes dynamicity, among others restrictions. In this paper, a novel method to manage data acquisition and fusion based on a distributed service composition model is presented, improving the data treatment in IoT pervasive environments.

  15. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  16. Internet of things (IoT) in 5G mobile technologies

    CERN Document Server

    Mastorakis, George; Batalla, Jordi

    2016-01-01

    This book reports on the latest advances in the modeling, analysis and efficient management of information in Internet of Things (IoT) applications in the context of 5G access technologies. It presents cutting-edge applications made possible by the implementation of femtocell networks and millimeter wave communications solutions, examining them from the perspective of the universally and constantly connected IoT. Moreover, it describes novel architectural approaches to the IoT and presents the new framework possibilities offered by 5G mobile networks, including middleware requirements, node-centrality and the location of extensive functionalities at the edge. By providing researchers and professionals with a timely snapshot of emerging mobile communication systems, and highlighting the main pitfalls and potential solutions, the book fills an important gap in the literature and will foster the further developments of 5G hosting IoT devices.

  17. AntibIoTic: Protecting IoT Devices Against DDoS Attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Dragoni, Nicola; Giaretta, Alberto

    2018-01-01

    The 2016 is remembered as the year that showed to the world how dangerous Distributed Denial of Service attacks can be. Gauge of the disruptiveness of DDoS attacks is the number of bots involved: the bigger the botnet, the more powerful the attack. This character, along with the increasing...... availability of connected and insecure IoT devices, makes DDoS and IoT the perfect pair for the malware industry. In this paper we present the main idea behind AntibIoTic, a palliative solution to prevent DDoS attacks perpetrated through IoT devices....

  18. Requirements to be made on future information systems in NPP operation

    International Nuclear Information System (INIS)

    Becker, G.; Distler, K.

    1987-01-01

    The objective of advanced operational information systems (OIS) is to support and alleviate the operator's work. Human skills and performance limits on the one hand, and the tasks of the operators during various operating states on the other hand are the bases for deriving system design requirements. The paper discusses such aspects like the dynamism of process events, the passive/active role played by the operators in normal/disturbed operation, the compatibility of information representation between OIS and conventional display configuration, parallel versus serial information presentation, team work of operators, parallel processing of tasks within the team; the resulting requirements are derived. (orig./DG) [de

  19. The atmosphere and ionosphere of Io

    International Nuclear Information System (INIS)

    McElroy, M.B.; Yung, Y.L.

    1975-01-01

    A variety of models for Io's atmosphere, ionosphere, surface, and environment are developed and discussed in the context of recent observational data. The sodium emission detected by Brown appears to require a collisional excitation process in Io's atmosphere, and the extended sodium emission measured by Trafton et al. may require scattering of the planetary radiation by an extended sodium cloud. The sodium is presumably present initially in bound form on Io's surface and may be released by the sputtering mechanism suggested by Matson et al. The ionosphere detected by the radio occultation experiment on Pioneer 10 could be attributed to photoionization of atmospheric sodium if Io's atmosphere could sustain significant vertical motions, of order 1 s/sup -1/ directed up during the day, down at night. Vertical motions of this magnitude could be driven by condensation of atmospheric NH 3 . The total density of gas at Io's surface appears to lie in the range 10 10 -10 12 molecules cm/sup -3/. Corpuscular ionization could play an additional role for the ionosphere. In this case the sateSe should exhibit an exceedingly bright, approx.10 kR, airglow at Lα. The incomplete hydrogen torus observed by Judge and Carlson in the vicinity of Io requires a large supply of hydrogen from the satellite's atmosphere. The escape flux should be of order 10 11 cm/sup -2/ s/sup -1/ and could be maintained by photolysis of atmospheric NH 3 . The observed geometry of the hydrogen torus appears to require a surprisingly short lifetime, approx.10 5 s, for neutral hydrogen near Io's orbit, and may indicate the presence of a large flux, approx.10 9 cm/sup -2/ s/sup -1/, of low-energy protons in Jupiter's magnetosphere. Implications of the hydrogen torus for the energy and mass balance of Jupiter's magnetosphere are discussed briefly, and observational programs are identified which might illuminate present uncertainties in our understanding of Io

  20. Technical information report: Plasma melter operation, reliability, and maintenance analysis

    International Nuclear Information System (INIS)

    Hendrickson, D.W.

    1995-01-01

    This document provides a technical report of operability, reliability, and maintenance of a plasma melter for low-level waste vitrification, in support of the Hanford Tank Waste Remediation System (TWRS) Low-Level Waste (LLW) Vitrification Program. A process description is provided that minimizes maintenance and downtime and includes material and energy balances, equipment sizes and arrangement, startup/operation/maintence/shutdown cycle descriptions, and basis for scale-up to a 200 metric ton/day production facility. Operational requirements are provided including utilities, feeds, labor, and maintenance. Equipment reliability estimates and maintenance requirements are provided which includes a list of failure modes, responses, and consequences

  1. Army Secure Operating System: Information Security for Real Time Systems

    National Research Council Canada - National Science Library

    Anderson, Eric

    1984-01-01

    The Army Secure Operating System (ASOS) project, under the management of the U.S. Army CECOM organization, will provide real time systems software necessary for fielding modern Battlefield Automation Systems...

  2. Weather information integration in transportation management center (TMC) operations.

    Science.gov (United States)

    2011-01-02

    This report presents the results of the third phase of an on-going FHWA study on weather integration in Transportation Management Center (TMC) operations. The report briefly describes the earlier phases of the integration study, summarizes the findin...

  3. 47 CFR 76.1610 - Change of operational information.

    Science.gov (United States)

    2010-10-01

    ..., partnership, corporation, or government entity. See § 76.5(cc). If the operator is a partnership, the legal... code, and e-mail address, if applicable, to which all communications are to be directed; (d) The nature...

  4. Human factors review of electric power dispatch control centers. Volume 4. Operator information needs. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Miller, R.J.; Najaf-Zadeh, K.; Darlington, H.T.; McNair, H.D.; Seidenstein, S.; Williams, A.R.

    1982-10-01

    Human factors is a systems-oriented interdisciplinary specialty concerned with the design of systems, equipment, facilities and the operational environment. An important aspect leading to the design requirements is the determination of the information requirements for electric power dispatch control centers. There are significant differences between the system operator's actions during normal and degraded states of power system operation, and power system restoration. This project evaluated the information the operator requires for normal power system and control system operations and investigates the changes of information required by the operator as the power system and/or the control system degrades from a normal operating state. The Phase II study, published in two volumes, defines power system states and control system conditions to which operator information content can be related. This volume presents detailed data concerning operator information needs that identify the needs for and the uses of power system information by a system operator in conditions ranging from normal through degraded operation. The study defines power system states and control system conditions to which operator information content can be related, and it identifies the requisite information as consistent with current industry practice so as to aid control system designers. Training requirements are also included for planning entry-level and follow-on training for operators.

  5. Are Current Psychological Operations Procedures Adequate in Information Warfare?

    National Research Council Canada - National Science Library

    Duff, Murray

    1997-01-01

    .... While some aspects of information warfare are conducted domestically, many are executed on foreign soil and involve extensive interaction with other governments, their population, non-governmental...

  6. 75 FR 31744 - Information Collection; Contract Operations and Administration

    Science.gov (United States)

    2010-06-04

    .... Forest Service officers collect the information from contractors who may be individuals, private sector... products including: (1) Planning and scheduling contract administration workloads, (2) planning and...

  7. Utilisation of operating experiences - NUCIA (Nuclear Information Archives)

    International Nuclear Information System (INIS)

    Tsuruta, T.

    2007-01-01

    In this presentation, 'NUCIA (Nuclear Information Archives)', an information-disclosure library for nuclear facilities, is introduced as one of the action cases to ensure transparency of nuclear facilities. At the opening of the presentation, the mechanisms of information disclosure to he used in the event of trouble are overviewed, and the role of NUCIA will be explained in the process. Next, registered information and the data on administrative performance are introduced after explaining the purpose and principal content of NUCIA referring to the on-screen display of the actual conditions of NUCIA. (author)

  8. IO-Link Wireless enhanced factory automation communication for Industry 4.0 applications

    Directory of Open Access Journals (Sweden)

    R. Heynicke

    2018-03-01

    Full Text Available In the context of the Industry 4.0 initiative, Cyber-Physical Production Systems (CPPS or Cyber Manufacturing Systems (CMS can be characterized as advanced networked mechatronic production systems gaining their added value by interaction with the ambient Industrial Internet of Things (IIoT. In this context appropriate communication technologies and standards play a vital role to realize the manifold potential improvements in the production process. One of these standards is IO-Link. In 2016 more than 5 million IO-Link nodes have been produced and delivered, still gaining increasing acceptance for the communication between sensors, actuators and the control level. The steadily increasing demand for more flexibility in automation solutions can be fulfilled using wireless technologies. With the wireless extension for the IO-Link standard, which will be presented in this article, maximum cycle times of 5 ms can be achieved with a probability that this limit will be exceeded to be at maximum one part per billion. Also roaming capabilities, wireless coexistence mechanisms and the possibility to include battery-powered or energy-harvesting sensors with very limited energy resources in the realtime network were defined. For system planning, setup, operation and maintenance, the standard engineering tools of IO-Link can be employed so that the backward compatibility with wired IO-Link solutions can be guaranteed. Interoperability between manufacturers is a key requirement for any communication standard, thus a procedure for IO-Link Wireless testing is also suggested.

  9. Active Storage with Analytics Capabilities and I/O Runtime System for Petascale Systems

    Energy Technology Data Exchange (ETDEWEB)

    Choudhary, Alok [Northwestern Univ., Evanston, IL (United States)

    2015-03-18

    Computational scientists must understand results from experimental, observational and computational simulation generated data to gain insights and perform knowledge discovery. As systems approach the petascale range, problems that were unimaginable a few years ago are within reach. With the increasing volume and complexity of data produced by ultra-scale simulations and high-throughput experiments, understanding the science is largely hampered by the lack of comprehensive I/O, storage, acceleration of data manipulation, analysis, and mining tools. Scientists require techniques, tools and infrastructure to facilitate better understanding of their data, in particular the ability to effectively perform complex data analysis, statistical analysis and knowledge discovery. The goal of this work is to enable more effective analysis of scientific datasets through the integration of enhancements in the I/O stack, from active storage support at the file system layer to MPI-IO and high-level I/O library layers. We propose to provide software components to accelerate data analytics, mining, I/O, and knowledge discovery for large-scale scientific applications, thereby increasing productivity of both scientists and the systems. Our approaches include 1) design the interfaces in high-level I/O libraries, such as parallel netCDF, for applications to activate data mining operations at the lower I/O layers; 2) Enhance MPI-IO runtime systems to incorporate the functionality developed as a part of the runtime system design; 3) Develop parallel data mining programs as part of runtime library for server-side file system in PVFS file system; and 4) Prototype an active storage cluster, which will utilize multicore CPUs, GPUs, and FPGAs to carry out the data mining workload.

  10. Information Flow Analysis of Level 4 Payload Processing Operations

    Science.gov (United States)

    Danz, Mary E.

    1991-01-01

    The Level 4 Mission Sequence Test (MST) was studied to develop strategies and recommendations to facilitate information flow. Recommendations developed as a result of this study include revised format of the Test and Assembly Procedure (TAP) document and a conceptualized software based system to assist in the management of information flow during the MST.

  11. Information Technology: Opportunities for Improving Acquisitions and Operations

    Science.gov (United States)

    2017-04-01

    1GAO, Federal Chief Information Officers : Opportunities Exist to Improve Role in Information Technology Management, GAO-11-634...approach and a collaborative relationship among agency executives (e.g., Chief Financial Officer and agency component leadership) had stopped 45...executives, including Chief Financial Officers and executives of major bureaus and component agencies for whom the technology is serving, to ensure that

  12. INFORMATIONAL APPLICATION FOR THE SUPPORT OF OPERATIONAL MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Rotaru Simona

    2008-05-01

    Full Text Available The development of the informational and communicational technology makes possible the use of a diversity of systems, instruments and technologies that offer to the decisional factors sharp and safe informations and also proper ways to process and analyse those informations in order to achieve an efficient development of their activities. We chose the internet - for theoretic and also for practical reasons - as informational technology because it stays at the base of other informational, decisional and communicational technologies - the intranet, the extranet, the web, the e-commerce, the groupware etc. Among the practical reasons we mention: low costs, fast communications and the performances inside the office and in relation with other people, especially with the clients; the market's development and the easier acquisition and fusion processes.

  13. 47 CFR 64.707 - Public dissemination of information by providers of operator services.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Public dissemination of information by providers of operator services. 64.707 Section 64.707 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... § 64.707 Public dissemination of information by providers of operator services. Providers of operator...

  14. There is no I/O like no I/O

    International Nuclear Information System (INIS)

    Johnston, T.Y.

    1985-01-01

    On most computer systems the most common cause of performance degradation is I/O contention. This paper will examine some efforts that can be taken in a VM environment to reduce I/O or its effect at both the global and local levels

  15. AP-IO: asynchronous pipeline I/O for hiding periodic output cost in CFD simulation.

    Science.gov (United States)

    Xiaoguang, Ren; Xinhai, Xu

    2014-01-01

    Computational fluid dynamics (CFD) simulation often needs to periodically output intermediate results to files in the form of snapshots for visualization or restart, which seriously impacts the performance. In this paper, we present asynchronous pipeline I/O (AP-IO) optimization scheme for the periodically snapshot output on the basis of asynchronous I/O and CFD application characteristics. In AP-IO, dedicated background I/O processes or threads are in charge of handling the file write in pipeline mode, therefore the write overhead can be hidden with more calculation than classic asynchronous I/O. We design the framework of AP-IO and implement it in OpenFOAM, providing CFD users with a user-friendly interface. Experimental results on the Tianhe-2 supercomputer demonstrate that AP-IO can achieve a good optimization effect for the periodical snapshot output in CFD application, and the effect is especially better for massively parallel CFD simulations, which can reduce the total execution time up to about 40%.

  16. AP-IO: Asynchronous Pipeline I/O for Hiding Periodic Output Cost in CFD Simulation

    Directory of Open Access Journals (Sweden)

    Ren Xiaoguang

    2014-01-01

    Full Text Available Computational fluid dynamics (CFD simulation often needs to periodically output intermediate results to files in the form of snapshots for visualization or restart, which seriously impacts the performance. In this paper, we present asynchronous pipeline I/O (AP-IO optimization scheme for the periodically snapshot output on the basis of asynchronous I/O and CFD application characteristics. In AP-IO, dedicated background I/O processes or threads are in charge of handling the file write in pipeline mode, therefore the write overhead can be hidden with more calculation than classic asynchronous I/O. We design the framework of AP-IO and implement it in OpenFOAM, providing CFD users with a user-friendly interface. Experimental results on the Tianhe-2 supercomputer demonstrate that AP-IO can achieve a good optimization effect for the periodical snapshot output in CFD application, and the effect is especially better for massively parallel CFD simulations, which can reduce the total execution time up to about 40%.

  17. Weather Information Services supporting Civilian UAS Operations, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — We build a system that supports the weather information needs of Unmanned Aircraft Systems (UAS) planning to fly in the National Airspace System (NAS). This weather...

  18. Integrating Programming Language and Operating System Information Security Mechanisms

    Science.gov (United States)

    2016-08-31

    suggestions for reducing the burden, to the Department of Defense, Executive Service Directorate (0704-0188). Respondents should be aware that...improve the precision of security enforcement, and to provide greater assurance of information security. This grant focuses on two key projects: language...based control of authority; and formal guarantees for the correctness of audit information. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17

  19. Cooperation between information system development and operations: a literature review

    NARCIS (Netherlands)

    Erich, Floris; Amrit, Chintan Amrit; Daneva, Maia; Torchiano, M.

    2014-01-01

    Software development can profit from improvements in the deployment and maintenance phases. DevOps improves these phases through a collection of principles and practices, centered around close collaboration between Development and Operations personnel. Both sides have paid little attention to issues

  20. Information Theory for Risk-based Water System Operation

    NARCIS (Netherlands)

    Weijs, S.V.

    2011-01-01

    Operational management of water resources needs predictions of future behavior of water systems, to anticipate shortage or excess of water in a timely manner. Because the natural systems that are part of the hydrological cycle are complex, the predictions inevitably are subject to considerable

  1. Design and Implementation of Henan Huinong Client System Based on iOS

    Directory of Open Access Journals (Sweden)

    Li Yan-Ling

    2016-01-01

    Full Text Available In order to meet the demands of customers related to agriculture who can obtain some Comprehensive agricultural information service of Henan Province through the intelligent mobile terminal, on the base of the Zhong yuan Rural Information Port integrated platform, employing IOS, Java, Eclipse, XML, SAX technology, we designed and developed Henan Huinong client systems based on ios mobile terminal. This system has achieved the multiple applications, such as agricultural information browsing, network consulting, expert online, crop rermote diagnosis and so on.

  2. 77 FR 41371 - Proposed Information Collection; Comment Request; Foreign Airline Operators' Revenues and...

    Science.gov (United States)

    2012-07-13

    ... policy questions related to foreign airline operators' revenues and expenses in the United States. There... DEPARTMENT OF COMMERCE Bureau of Economic Analysis Proposed Information Collection; Comment Request; Foreign Airline Operators' Revenues and Expenses in the United States ACTION: Notice. SUMMARY...

  3. Testing market informational efficiency of Constanta port operators

    Science.gov (United States)

    Roşca, E.; Popa, M.; Ruscă, F.; Burciu, Ş.

    2015-11-01

    The Romanian capital market is still an emergent one. Following the mass- privatization process and the private investments, three of the most important handling and storage companies acting in Constantza Port (OIL Terminal, Comvex and SOCEP) are listed on Romanian Stock Exchange. The paper investigates their evolution on the market, identifying the expected rate of return and the components of the shares risk (specific and systematic). Also, the price evolution could be analyzed through the informational efficiency which instantly reflects the price relevance. The Jarque-Bera normality test regarding the shares return rate distribution and the Fama test for the informational efficiency are completed for each company. The market price model is taken into consideration for price forecasting, computing the return rate auto-correlations. The results are subject of interpretation considering additional managerial and financial information of the companies’ activity.

  4. In-Network Data Processing in Software-Defined IoT with a Programmable Data Plane

    Directory of Open Access Journals (Sweden)

    Ki-Wook Kim

    2018-01-01

    Full Text Available Making an SDN data plane flexible enough to satisfy the various requirements of heterogeneous IoT applications is very desirable in terms of software-defined IoT (SD-IoT networking. Network devices with a programmable data plane provide an ability to dynamically add new packet- and data-processing procedures to IoT applications. The previously proposed solutions for the addition of the programmability feature to the SDN data plane provide extensibility for the packet-forwarding operations of new protocols, but IoT applications need a more flexible programmability for in-network data-processing operations (e.g., the sensing-data aggregation from thousands of sensor nodes. Moreover, some IoT models such as OMG DDS, oneM2M, and Eclipse SCADA use the publish-subscribe model that is difficult to represent using the operations of the existing message-centric data-plane models. We introduce a new in-network data-processing scheme for the SD-IoT data plane that defines an event-driven data-processing model that can express a variety of in-network data-processing cases in the SD-IoT environment. Also, the proposed model comprises a language for the programming of the data-processing procedures, while a flexible data-plane structure that can install and execute the programs at runtime is additionally presented. We demonstrate the flexibility of the proposed scheme by using sample programs in a number of example SD-IoT cases.

  5. Io's Active Eruption Plumes: Insights from HST

    Science.gov (United States)

    Jessup, K. L.; Spencer, J. R.

    2011-10-01

    Taking advantage of the available data, we recently [10] completed a detailed analysis of the spectral signature of Io's Pele-type Tvashtar plume as imaged by the HST Wide Field and Planetary Camera 2 (HST/WFPC2) via absorption during Jupiter transit and via reflected sunlight in 2007, as well as HST/WFPC2 observations of the 1997 eruption of Io's Prometheus-type Pillan plume (Fig. 1). These observations were obtained in the 0.24-0.42 μm range, where the plumes gas absorption and aerosol scattering properties are most conspicuous. By completing a detailed analysis of these observations, several key aspects of the reflectance and the absorption properties of the two plumes have been revealed. Additionally, by considering the analysis of the HST imaging data in light of previously published spectral analysis of Io's Prometheus and Pele-type plumes several trends in the plume properties have been determined, allowing us to define the relative significance of each plume on the rate of re-surfacing occurring on Io and providing the measurements needed to better assess the role the volcanoes play in the stability of Io's tenuous atmosphere.

  6. National Ignition Facility Control and Information System Operational Tools

    International Nuclear Information System (INIS)

    Marshall, C.D.; Beeler, R.G.; Bowers, G.A.; Carey, R.W.; Fisher, J.M.; Foxworthy, C.B.; Frazier, T.M.; Mathisen, D.G.; Lagin, L.J.; Rhodes, J.J.; Shaw, M.J.

    2009-01-01

    The National Ignition Facility (NIF) in Livermore, California, is the world's highest-energy laser fusion system and one of the premier large scale scientific projects in the United States. The system is designed to setup and fire a laser shot to a fusion ignition or high energy density target at rates up to a shot every 4 hours. NIF has 192 laser beams delivering up to 1.8 MJ of energy to a ∼2 mm target that is planned to produce >100 billion atm of pressure and temperatures of >100 million degrees centigrade. NIF is housed in a ten-story building footprint the size of three football fields as shown in Fig. 1. Commissioning was recently completed and NIF will be formally dedicated at Lawrence Livermore National Laboratory on May 29, 2009. The control system has 60,000 hardware controls points and employs 2 million lines of control system code. The control room has highly automated equipment setup prior to firing laser system shots. This automation has a data driven implementation that is conducive to dynamic modification and optimization depending on the shot goals defined by the end user experimenters. NIF has extensive facility machine history and infrastructure maintenance workflow tools both under development and deployed. An extensive operational tools suite has been developed to support facility operations including experimental shot setup, machine readiness, machine health and safety, and machine history. The following paragraphs discuss the current state and future upgrades to these four categories of operational tools.

  7. Seeking opportunities in the Internet of Things (IoT): : A Study of IT values co-creation in the IoT ecosystem while considering the potential impacts of the EU General Data Protection Regulations (GDPR).

    OpenAIRE

    Ford, David Thomas; Qamar, Sreman

    2017-01-01

    In this thesis, we have studied the phenomena of value co-creation in IoT ecosystem, while considering the potential impacts of GDPR on IT value co-creation in the IoT ecosystem. IT firms’ ability to create value is an important aspect of their existence and growth in which case they pursuit different and several means to accomplish this task. IT firms that operate within the IoT ecosystem are categorised as Enablers, Engagers, and Enhancers who interact, work together to provide the technolo...

  8. Techniques for Information Collection During Operations Among Populations

    Science.gov (United States)

    2016-04-05

    search for weapons and potentially exploitable material, to include personal property inside visible or hidden pockets . Males avoid searching females...of interest to the tactical command. Information obtained from individuals (for example, pocket contents or biometric enrollment) provides...JP 1-02. Department of Defense Dictionary of Military and Associated Terms. 08 November 2010. ARMY PUBLICATIONS Most Army doctrinal publications are

  9. An Information Technology Manager's Guide to Campus Phone Operations.

    Science.gov (United States)

    Sherron, Gene T.

    Written for the information technology manager who is about to enter the telephone communications system business, this paper takes a "primer" approach, outlining the major issues in telecommunications which face all higher education campuses today. An introduction which places the issues into perspective is followed by a quick look at the history…

  10. Developing an M-Learning Application for iOS

    Directory of Open Access Journals (Sweden)

    Paul POCATILU

    2013-01-01

    Full Text Available The mobile market development has a high impact on all domains including education. Smart mobile devices started to be affordable and the massive use on educational processes does not seem to be too far. Mobile learning applications are be targeted for all major mobile operating systems as native applications or Web-based. The objective of this paper is to present the implementation of the evaluation module for an m-learning application developed for iOS devices. The m-learning application is targeted to a higher education institution. The application uses Web services in order to obtain the content and to authenticate the users.

  11. Ultrascalable Techniques Applied to the Global Intelligence Community Information Awareness Common Operating Picture (IA COP)

    National Research Council Canada - National Science Library

    Valdes, Alfonso; Kadte, Jim

    2005-01-01

    The focus of this research is to develop detection, correlation, and representation approaches to address the needs of the Intelligence Community Information Awareness Common Operating Picture (IA COP...

  12. Interim policy on establishment and operation of internet open, anonymous information servers and services

    OpenAIRE

    Acting Dean of Computer and Information Services

    1995-01-01

    Purpose. To establish interim NPS general policy regarding establishment and operation of Open, Anonymous Information Servers and Services, such as World Wide Web (http), Gopher, Anonymous FTP, etc...

  13. INFORMATION SECURITY: Strengthened Management Needed to Protect Critical Federal Operations and Assets

    National Research Council Canada - National Science Library

    Dodaro, Gene

    1998-01-01

    .... Our most recent report, done at the request of this Committee, delineates the serious information security weaknesses placing critical operations and assets at risk and outlines actions needed...

  14. An Ontological Approach to Developing Information Operations Applications for use on the Semantic Web

    National Research Council Canada - National Science Library

    Clarke, Timothy L

    2008-01-01

    .... By expressing IO capabilities in a formal ontology suitable for use on the Semantic Web, conditions are set such that computational power can more efficiently be leveraged to better define required...

  15. An Ontological Approach to Developing Information Operations Applications for Use on the Semantic Web

    National Research Council Canada - National Science Library

    Clarke, Timothy L

    2008-01-01

    .... By expressing IO capabilities in a formal ontology suitable for use on the Semantic Web, conditions are set such that computational power can more efficiently be leveraged to better define required...

  16. New co-operative potato distilleries - interesting and useful information

    Energy Technology Data Exchange (ETDEWEB)

    Dreipe, H

    1970-01-01

    Impressions and accounts of a series of new cooperative potato distilleries in north and north-west Germany are reported. Design and operation of the plants are described, and economic aspects of waste utilization and alcohol production are discussed. Indications of the starch content and yield of different varieties of potato mainly cultivated for distilleries are given. 100 kg of potatoes with 16% starch normally yield 10 l. of ethyl alcohol, which is sold at a guaranteed price. The protein in the residue is digestible and has a high feed value.

  17. Development of Information Display System for Operator Support in Severe Accident

    International Nuclear Information System (INIS)

    Jeong, Kwang Il; Lee, Joon Ku

    2016-01-01

    When the severe accident occurs, the technical support center (TSC) performs the mitigation strategy with severe accident management guidelines (SAMG) and communicates with main control room (MCR) operators to obtain information of plant's status. In such circumstances, the importance of an information display for severe accident is increased. Therefore an information display system dedicated to severe accident conditions is required to secure the plant information, to provide the necessary information to MCR operators and TSC operators, and to support the decision using these information. We setup the design concept of severe accident information display system (SIDS) in the previous study and defined its requirements of function and performance. This paper describes the process, results of the identification of the severe accident information for MCR operator and the implementation of SIDS. Further implementation on post-accident monitoring function and data validation function for severe accidents will be accomplished in the future

  18. Development of Information Display System for Operator Support in Severe Accident

    Energy Technology Data Exchange (ETDEWEB)

    Jeong, Kwang Il; Lee, Joon Ku [KAERI, Daejeon (Korea, Republic of)

    2016-05-15

    When the severe accident occurs, the technical support center (TSC) performs the mitigation strategy with severe accident management guidelines (SAMG) and communicates with main control room (MCR) operators to obtain information of plant's status. In such circumstances, the importance of an information display for severe accident is increased. Therefore an information display system dedicated to severe accident conditions is required to secure the plant information, to provide the necessary information to MCR operators and TSC operators, and to support the decision using these information. We setup the design concept of severe accident information display system (SIDS) in the previous study and defined its requirements of function and performance. This paper describes the process, results of the identification of the severe accident information for MCR operator and the implementation of SIDS. Further implementation on post-accident monitoring function and data validation function for severe accidents will be accomplished in the future.

  19. Trust and Influence in the Information Age: Operational Requirements for Network Centric Warfare

    National Research Council Canada - National Science Library

    Blatt, Nicole

    2004-01-01

    ...) based on information technology. This thesis will show that the Information RMA not only exists, but will also reshape how we plan, operate, educate, organize, train, and equip forces for the 21st century...

  20. Fisher information, Borges operators, and q-calculus

    Science.gov (United States)

    Pennini, F.; Plastino, A.; Ferri, G. L.

    2008-10-01

    We discuss applying the increasingly popular q-calculus, or deformed calculus, so as to suitably generalize Fisher’s information measure and the Cramer-Rao inequality. A q-deformation can be attained in multiple ways, and we show that most of them do not constitute legitimate procedures. Within such a context, the only completely acceptable q-deformation is that ensuing from using the so-called Borges derivative [E.P. Borges, Physica A 340 (2004) 95].

  1. Mobile Geospatial Information Systems for Land Force Operations: Analysis of Operational Needs and Research Opportunities

    Science.gov (United States)

    2010-03-01

    road barriers (e.g., dragon teeth) and searches vehicles for weapons and proper license plates. The rifleman also escorts VIPs after conveying the...Are there automated systems that know that in X scenario, operator Y would want to see Z , or is there an exhaustive list of options that the operator...directional) or a trackball (moves in any direction). Selection is made my depressing the wheel/ ball . • Keyboard – The size of the keyboard can

  2. The Structure and Composition of Io's Atmosphere

    Science.gov (United States)

    Smyth, W. H.; Marconi, M. L.

    2011-12-01

    Io's atmosphere is thought to be generated principally by sublimation on the dayside and by multiple volcanoes scattered throughout its surface and more concentrated near the equator. While SO2 seems to be the principle product of these sources, many other chemical species are placed into the atmosphere by these sources, including substantial amounts of SO and S2 as well as smaller but observationally significant amounts of Na bearing molecules. These species in turn interact strongly with the torus plasma generating additional species such as O2, S, O, and Na. The strong interaction of the torus plasma with the neutral atmosphere not only exerts a profound effect on the composition of Io's atmosphere but also strongly affects the dynamics and thermodynamics of Io's atmosphere, particularly at higher altitudes. In addition, as Io orbits Jupiter, the change in location of the sublimation region and the eclipse of Io as it passes through Jupiter's shadow result in substantial variation in the atmosphere. A complex time-dependent three-dimensional atmosphere with strong spatial compositional variation is created. Here we extend the two-dimensional multispecies Navier-Stokes model of Smyth and Wong (2004) to three-dimensions, include two volcanic sources similar to Pele and Loki, and include the effect of Io's movement around Jupiter on sublimation. The effects of the torus plasma are also included as in Smyth and Wong. We will present the overall composition and structure of the atmosphere, O to S ratios in the upper atmosphere, and discuss a potential issue with the O2 abundance. Smyth, W.H. and M.C. Wong, Icarus 171, 171-182, 2004.

  3. MedAd-AppQ: A quality assessment tool for medication adherence apps on iOS and android platforms.

    Science.gov (United States)

    Ali, Eskinder Eshetu; Teo, Amanda Kai Sin; Goh, Sherlyn Xue Lin; Chew, Lita; Yap, Kevin Yi-Lwern

    2018-02-02

    With the recent proliferation of smartphone medication adherence applications (apps), it is increasingly more difficult for patients and clinicians to identify the most useful app. To develop a quality assessment tool for medication adherence apps, and evaluate the quality of such apps from the major app stores. In this study, a Medication Adherence App Quality assessment tool (MedAd-AppQ) was developed and two evaluators independently assessed apps that fulfilled the following criteria: availability in English, had at least a medication reminder feature, non-specific to certain disease conditions (generic apps), free of technical malfunctions and availability on both the iPhone Operating System (iOS) and Android platforms. Descriptive statistics, Mann-Whitney U test, Pearson product moment correlation and Spearman rank-order correlation were used for statistical analysis. MedAd-AppQ was designed to have 24 items (total 43 points) categorized under three sections: content reliability (11 points), feature usefulness (29 points) and feature convenience (3 points). The three sections of MedAd-AppQ were found to have inter-rater correlation coefficients of 0.801 (p-value apps (27 iOS and 25 Android), quality scores ranged between 7/43 (16.3%) and 28/43 (65.1%). There was no significant difference between the quality scores of the Android and iOS versions. None of the apps had features for self-management of side effects. Only two apps in each platform provided disease-related and/or medication information. MedAd-AppQ can be used to reliably assess the quality of adherence apps. Clinicians can use the tool in selecting apps for use by patients. Developers of adherence apps should consider features that provide therapy-related information and help patients in medications and side-effects management. Copyright © 2018 Elsevier Inc. All rights reserved.

  4. IoTFLiP: IoT-based flipped learning platform for medical education

    Directory of Open Access Journals (Sweden)

    Maqbool Ali

    2017-08-01

    Full Text Available Case-Based Learning (CBL has become an effective pedagogy for student-centered learning in medical education, which is founded on persistent patient cases. Flippped learning and Internet of Things (IoTs concepts have gained significant attention in recent years. Using these concepts in conjunction with CBL can improve learning ability by providing real evolutionary medical cases. It also enables students to build confidence in their decision making, and efficiently enhances teamwork in the learing environment. We propose an IoT-based Flip Learning Platform, called IoTFLiP, where an IoT infrastructure is exploited to support flipped case-based learning in a cloud environment with state of the art security and privacy measures for personalized medical data. It also provides support for application delivery in private, public, and hybrid approaches. The proposed platform is an extension of our Interactive Case-Based Flipped Learning Tool (ICBFLT, which has been developed based on current CBL practices. ICBFLT formulates summaries of CBL cases through synergy between students' and medical expert knowledge. The low cost and reduced size of sensor device, support of IoTs, and recent flipped learning advancements can enhance medical students' academic and practical experiences. In order to demonstrate a working scenario for the proposed IoTFLiP platform, real-time data from IoTs gadgets is collected to generate a real-world case for a medical student using ICBFLT.

  5. Professional iOS database application programming

    CERN Document Server

    Alessi, Patrick

    2013-01-01

    Updated and revised coverage that includes the latest versions of iOS and Xcode Whether you're a novice or experienced developer, you will want to dive into this updated resource on database application programming for the iPhone and iPad. Packed with more than 50 percent new and revised material - including completely rebuilt code, screenshots, and full coverage of new features pertaining to database programming and enterprise integration in iOS 6 - this must-have book intends to continue the precedent set by the previous edition by helping thousands of developers master database

  6. Intrusion Detection System In IoT

    OpenAIRE

    Nygaard, Frederik

    2017-01-01

    Intrusion detection detects misbehaving nodes in a network. In Internet of Things(IoT), IPv6 Routing for Low-Power and Lossy Networks (RPL) is the standard routing protocol. In IoT, devices commonly have low energy, storage and memory, which is why the implemented intrusion algorithm in this thesis will try to minimize the usage of these resources. IDS for RPL-networks have been implemented before, but the use of resources or the number of packets sent was too high to be successful when findi...

  7. Secure Information Exchange Gateway for Electric Grid Operations

    Energy Technology Data Exchange (ETDEWEB)

    Robertson, F. Russell [Grid Protection Alliance, Chattanooga, TN (United States); Carroll, J. Ritchie [Grid Protection Alliance, Chattanooga, TN (United States); Sanders, William [Univ. of Illinois, Urbana-Champaign, IL (United States); Yardley, Timothy [Univ. of Illinois, Urbana-Champaign, IL (United States); Heine, Erich [Univ. of Illinois, Urbana-Champaign, IL (United States); Hadley, Mark [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); McKinnon, David [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Motteler, Barbara [Alstom Grid Inc., Levallois-Perret Cedex (France); Giri, Jay [Grid Protection Alliance, Chattanooga, TN (United States); Walker, William [PJM Interconnection (PJM), Norristown, PA (United States); McCartha, Esrick [PJM Interconnection (PJM), Norristown, PA (United States)

    2014-09-30

    The major objectives of the SIEGate project were to improve the security posture and minimize the cyber-attack surface of electric utility control centers and to reduce the cost of maintaining control-room-to-control-room information exchange. Major project goals included the design, development, testing, and commercialization of a single security-hardened appliance that could meet industry needs for resisting cyber-attacks while protecting the confidentiality and integrity of a growing volume of real-time information needed to ensure the reliability of the bulk electric system and interoperating with existing data formats and networking technologies. The SIEGate project has achieved its goals and objectives. The SIEGate Design Document, issued in March 2012, presented SIEGate use cases, provided SIEGate requirements, established SIEGate design principles, and prescribed design functionality of SIEGate as well as the components that make up SIEGate. SIEGate Release Version 1.0 was posted in January 2014. Release Version 1.0.83, which was posted on March 28, 2014, fixed many issues discovered by early adopters and added several new features. Release Candidate 1.1, which added additional improvements and bug fixes, was posted in June 2014. SIEGate executables have been downloaded more than 300 times. SIEGate has been tested at PJM, Entergy, TVA, and Southern. Security testing and analysis of SIEGate has been conducted at PNNL and PJM. Alstom has provided a summary of recommended steps for commercialization of the SIEGate Appliance and identified two deployment models with immediate commercial application.

  8. An IoT Based Predictive Connected Car Maintenance Approach

    OpenAIRE

    Rohit Dhall; Vijender Kumar Solanki

    2017-01-01

    Internet of Things (IoT) is fast emerging and becoming an almost basic necessity in general life. The concepts of using technology in our daily life is not new, but with the advancements in technology, the impact of technology in daily activities of a person can be seen in almost all the aspects of life. Today, all aspects of our daily life, be it health of a person, his location, movement, etc. can be monitored and analyzed using information captured from various connected devices. This pape...

  9. Cracking ShadowCrypt: Exploring the Limitations of Secure I/O Systems in Internet Browsers

    OpenAIRE

    Freyberger Michael; He Warren; Akhawe Devdatta; Mazurek Michelle L.; Mittal Prateek

    2018-01-01

    An important line of privacy research is investigating the design of systems for secure input and output (I/O) within Internet browsers. These systems would allow for users’ information to be encrypted and decrypted by the browser, and the specific web applications will only have access to the users’ information in encrypted form. The state-of-the-art approach for a secure I/O system within Internet browsers is a system called ShadowCrypt created by UC Berkeley researchers [23]. This paper wi...

  10. Grabens on Io: Evidence for Extensional Tectonics

    Science.gov (United States)

    Hoogenboom, T.; Schenk, P.

    2012-12-01

    Io may well be the most geologically active body in the solar system. A variety of volcanic features have been identified, including a few fissure eruptions, but tectonism is generally assumed to be limited to compression driven mountain formation (Schenk et al., 2001). A wide range of structural features can also be identified including scarps, lineaments, faults, and circular depressions (pits and patera rims). Narrow curvilinear graben (elongated, relatively depressed crustal unit or block that is bounded by faults on its sides) are also scattered across Io's volcanic plains. These features are dwarfed by the more prominent neighboring volcanoes and mountains, and have been largely ignored in the literature. Although they are likely to be extensional in origin, their relationship to local or global stress fields is unknown. We have mapped the locations, length and width of graben on Io using all available Voyager and Galileo images with a resolution better than 5 km. We compare the locations of graben with existing volcanic centers, paterae and mountain data to determine the degree of correlation between these geologic features and major topographic variations (basins/swells) in our global topographic map of Io (White et al., 2011). Graben are best observed in > 1-2 km low-sun angle images. Approximately 300 images were converted from ISIS to ArcMap format to allow easy comparison with the geological map of Io (Williams et al., 2012) along with previous higher resolution structural mapping of local areas (e.g. Crown et al., 1992). We have located >45 graben to date. Typically 1-3 kilometers across, some of these features can stretch for over 500 kilometers in length. Their formation may be related to global tidal stresses or local deformation. Io's orbit is eccentric and its solid surface experiences daily tides of up to ˜0.1 km, leading to repetitive surface strains of 10-4 or greater. These tides flex and stress the lithosphere and can cause it to fracture

  11. Modular HPC I/O characterization with Darshan

    Energy Technology Data Exchange (ETDEWEB)

    Snyder, Shane; Carns, Philip; Harms, Kevin; Ross, Robert; Lockwood, Glenn K.; Wright, Nicholas J.

    2016-11-13

    Contemporary high-performance computing (HPC) applications encompass a broad range of distinct I/O strategies and are often executed on a number of different compute platforms in their lifetime. These large-scale HPC platforms employ increasingly complex I/O subsystems to provide a suitable level of I/O performance to applications. Tuning I/O workloads for such a system is nontrivial, and the results generally are not portable to other HPC systems. I/O profiling tools can help to address this challenge, but most existing tools only instrument specific components within the I/O subsystem that provide a limited perspective on I/O performance. The increasing diversity of scientific applications and computing platforms calls for greater flexibililty and scope in I/O characterization.

  12. Navigation and Alignment Aids Concept of Operations and Supplemental Design Information. Revision A

    Science.gov (United States)

    Kelly, Sean M.; Cryan, Scott P.

    2016-01-01

    The IDSS Navigation and Alignment Aids Concept of Operations and Supplemental Design Information document provides supplemental information to the IDSS IDD. The guide provides insight into the navigation and alignment aids design, and how those aids can be utilized by incoming vehicles for proximity operations and docking. The navigation aids are paramount to successful docking.

  13. 30 CFR 773.9 - Review of applicant, operator, and ownership and control information.

    Science.gov (United States)

    2010-07-01

    ... operator's organizational structure and ownership or control relationships. (b) We must conduct the review... and control information. 773.9 Section 773.9 Mineral Resources OFFICE OF SURFACE MINING RECLAMATION....9 Review of applicant, operator, and ownership and control information. (a) We, the regulatory...

  14. Supporting the Maritime Information Dominance: Optimizing Tactical Network for Biometric Data Sharing in Maritime Interdiction Operations

    Science.gov (United States)

    2015-03-01

    biometric data collection. Capture role- player mock biometric data including finger prints, iris scans, and facial recognition photos. (MOC training...MARITIME INFORMATION DOMINANCE: OPTIMIZING TACTICAL NETWORK FOR BIOMETRIC DATA SHARING IN MARITIME INTERDICTION OPERATIONS by Adam R. Sinsel...MARITIME INFORMATION DOMINANCE: OPTIMIZING TACTICAL NETWORK FOR BIOMETRIC DATA SHARING IN MARITIME INTERDICTION OPERATIONS 6. AUTHOR(S) Adam R

  15. AirPrint Forensics: Recovering the Contents and Metadata of Printed Documents from iOS Devices

    Directory of Open Access Journals (Sweden)

    Luis Gómez-Miralles

    2015-01-01

    data they may store, opens new opportunities in the field of computer forensics. In 2010, version 4 of the iOS operating system introduced AirPrint, a simple and driverless wireless printing functionality supported by hundreds of printer models from all major vendors. This paper describes the traces left in the iOS device when AirPrint is used and presents a method for recovering content and metadata of documents that have been printed.

  16. Prototype Pengendalian Lampu Jarak Jauh Dengan Jaringan Internet Berbasis Internet of Things(IoT) Menggunakan Rasberry Pi 3

    OpenAIRE

    Muzawi, Rometdo; Efendi, Yoyon; Sahrun, Nori

    2018-01-01

    Abstract— Internet of Thing (IoT) is a concept that aims to expand the benefits of internet connectivity that is connected continuously. Internet of thing (IoT) can be utilized on buildings to control electronic equipment such as operating room lights remotely through a computer network. Research is done by building a device remote control that utilizes internet technology to perform the process of control in the network local through a web server that is embedded into the remote control devi...

  17. Reproducibility and Variability of I/O Performance on BG/Q: Lessons Learned from a Data Aggregation Algorithm

    Energy Technology Data Exchange (ETDEWEB)

    Tessier, Francois [Argonne National Lab. (ANL), Argonne, IL (United States); Vishwanath, Venkatram [Argonne National Lab. (ANL), Argonne, IL (United States)

    2017-11-28

    Reading and writing data efficiently from different tiers of storage is necessary for most scientific simulations to achieve good performance at scale. Many software solutions have been developed to decrease the I/O bottleneck. One wellknown strategy, in the context of collective I/O operations, is the two-phase I/O scheme. This strategy consists of selecting a subset of processes to aggregate contiguous pieces of data before performing reads/writes. In our previous work, we implemented the two-phase I/O scheme with a MPI-based topology-aware algorithm. Our algorithm showed very good performance at scale compared to the standard I/O libraries such as POSIX I/O and MPI I/O. However, the algorithm had several limitations hindering a satisfying reproducibility of our experiments. In this paper, we extend our work by 1) identifying the obstacles we face to reproduce our experiments and 2) discovering solutions that reduce the unpredictability of our results.

  18. 78 FR 64526 - Information Collection Activities: Sulphur Operations; Submitted for Office of Management and...

    Science.gov (United States)

    2013-10-29

    ...: Sulphur Operations; Submitted for Office of Management and Budget (OMB) Review; Comment Request ACTION: 30... paperwork requirements in the regulations under Subpart P, Sulphur Operations. This notice also provides the..., Currently Under Review). SUPPLEMENTARY INFORMATION: Title: 30 CFR 250, Subpart P, Sulphur Operations. OMB...

  19. Linear SVM-Based Android Malware Detection for Reliable IoT Services

    Directory of Open Access Journals (Sweden)

    Hyo-Sik Ham

    2014-01-01

    Full Text Available Current many Internet of Things (IoT services are monitored and controlled through smartphone applications. By combining IoT with smartphones, many convenient IoT services have been provided to users. However, there are adverse underlying effects in such services including invasion of privacy and information leakage. In most cases, mobile devices have become cluttered with important personal user information as various services and contents are provided through them. Accordingly, attackers are expanding the scope of their attacks beyond the existing PC and Internet environment into mobile devices. In this paper, we apply a linear support vector machine (SVM to detect Android malware and compare the malware detection performance of SVM with that of other machine learning classifiers. Through experimental validation, we show that the SVM outperforms other machine learning classifiers.

  20. Surgery information reduces anxiety in the pre-operative period

    Directory of Open Access Journals (Sweden)

    Kiyohara Leandro Yoshinobu

    2004-01-01

    Full Text Available PURPOSE: Patients preparing to undergo surgery should not suffer needless anxiety. This study aimed to evaluate anxiety levels on the day before surgery as related to the information known by the patient regarding the diagnosis, surgical procedure, or anesthesia. METHOD: Patients reported their knowledge of diagnosis, surgery, and anesthesia. The Spielberger State-Trait Anxiety Inventory (STAI was used to measure patient anxiety levels. RESULTS: One hundred and forty-nine patients were selected, and 82 females and 38 males were interviewed. Twenty-nine patients were excluded due to illiteracy. The state-anxiety levels were alike for males and females (36.10 ± 11.94 vs. 37.61 ± 8.76 (mean ± SD. Trait-anxiety levels were higher for women (42.55 ± 10.39 vs. 38.08 ± 12.25, P = 0.041. Patient education level did not influence the state-anxiety level but was inversely related to the trait-anxiety level. Knowledge of the diagnosis was clear for 91.7% of patients, of the surgery for 75.0%, and of anesthesia for 37.5%. Unfamiliarity with the surgical procedure raised state-anxiety levels (P = 0.021. A lower state-anxiety level was found among patients who did not know the diagnosis but knew about the surgery (P = 0.038. CONCLUSIONS: Increased knowledge of patients regarding the surgery they are about to undergo may reduce their state-anxiety levels.

  1. Designing the IoT sandbox

    NARCIS (Netherlands)

    Frens, Joep; Funk, Mathias; van Hout, Bastiaan; Le Blanc, Joep

    2018-01-01

    This pictorial describes the design and design process of the IoT Sandbox: a (scale model of a) smart home equipped with actuators and a modular interface that controls the interactive aspects of the smart home. This modular interface can 'grow" together with the house it controls whereby it offers

  2. Electron distribution functions in Io plasma torus

    International Nuclear Information System (INIS)

    Boev, A.G.

    2003-01-01

    Electron distribution functions measured by the Voyager 1 in different shares of the Io plasma torus are explained. It is proved that their suprathermal tails are formed by the electrical field induced by the 'Jupiter wind'. The Maxwellian parts of all these spectra characterize thermal equilibrium populations of electrons and the radiation of exited ions

  3. Io with Loki Plume on Bright Limb

    Science.gov (United States)

    1990-01-01

    Voyager 1 image of Io showing active plume of Loki on limb. Heart-shaped feature southeast of Loki consists of fallout deposits from active plume Pele. The images that make up this mosaic were taken from an average distance of approximately 490,000 kilometers (340,000 miles).

  4. NIMS Observation of Hotspots on Io

    Science.gov (United States)

    1996-01-01

    Io has been imaged by the Near Infrared Mapping Spectrometer (NIMS) on Galileo. The image on the right shows for the first time the distribution of volcanic hotspots on the surface of Io, as seen by NIMS. Three of these hotspots are new discoveries, only detectable with the NIMS instrument. This image was taken during the G1 encounter on June 29 1996. The image on the left shows the same view of Io as seen by the Voyager spacecraft in 1979. At least one dozen hotspots have been identified from this NIMS image. Most of the hotspot locations can be matched with volcanic features on the surface of Io, including the vent area of the active Prometheus plume.The Jet Propulsion Laboratory, Pasadena, CA manages the mission for NASA's Office of Space Science, Washington, DC.This image and other images and data received from Galileo are posted on the World Wide Web, on the Galileo mission home page at URL http://galileo.jpl.nasa.gov.

  5. Topographic evidence for shield volcanism on Io

    International Nuclear Information System (INIS)

    Moore, J.M.; Mcewen, A.S.; Albin, E.F.; Greeley, R.

    1986-01-01

    Similarities between terrestrial shield volcanoes and a volcano on Io observed in Voyager I imagery of the satellite at 30 0 S, 246 0 W are delineated. A photoclinometry model was used to numerically estimate the slope based on the Minnaert photometric function. The slope values are accurate to within 10 deg on the sun-facing slope and 1 deg on the shadow side. As found with shield volcanoes, the feature has a central edifice, 40-50 km in diameter, and a broad, elliptical base, 77 x 90 km across. The summit of the Io volcano is 2.2-2.8 km above the surrounding plane and contains a caldera about 5 km in diameter. The similarity in shape between basaltic terrestrial shield volcanoes and the Io volcano indicates that the Io feature may also be composed of basalt. The composition could be sulfur if the heat flow was under 0.05 W/sq m, as it might have been in later stages of formation. 9 references

  6. Re-integrating Influence and Cyber Operations

    Science.gov (United States)

    2011-06-01

    30 3.6 Social Engineering ......................................................................................................... 33 3.7 The “ Sexy ...need to show results. 3.7 The “ Sexy Part” of IO In early 2001, the 92 nd Information Warfare Aggressor Squadron in San Antonio was struggling with...commander, “Network Operations is the Sexy Part of IO”. This commander was correct in a way, but for reasons unknown at the time. The Air Force has

  7. Visualization and parallel I/O at extreme scale

    International Nuclear Information System (INIS)

    Ross, R B; Peterka, T; Shen, H-W; Hong, Y; Ma, K-L; Yu, H; Moreland, K

    2008-01-01

    In our efforts to solve ever more challenging problems through computational techniques, the scale of our compute systems continues to grow. As we approach petascale, it becomes increasingly important that all the resources in the system be used as efficiently as possible, not just the floating-point units. Because of hardware, software, and usability challenges, storage resources are often one of the most poorly used and performing components of today's compute systems. This situation can be especially true in the case of the analysis phases of scientific workflows. In this paper we discuss the impact of large-scale data on visual analysis operations and examine a collection of approaches to I/O in the visual analysis process. First we examine the performance of volume rendering on a leadership-computing platform and assess the relative cost of I/O, rendering, and compositing operations. Next we analyze the performance implications of eliminating preprocessing from this example workflow. Then we describe a technique that uses data reorganization to improve access times for data-intensive volume rendering

  8. AUDIT DISCLOSURE OF MATERIAL INFORMATION ON OPERATING SEGMENTS THE ACTIVITIES OF THE ORGANIZATIONS OF TOURIST SPHERE

    Directory of Open Access Journals (Sweden)

    Екатерина Николаевна Скорикова

    2013-04-01

    Full Text Available In modern conditions market economy for take decisions of use services tourist organizations, users not enough relevant information of financial result activities.The article considered audit disclosure relevant information on operating segments activities, for example tourist organizations.In result research considered operating segments on current and discontinued activities, and their impact on disclosure relevant information of financial result.Proposed option disclosure relevant information on operating segments activities in explanatory Note to the annual financial statements.Received results prove, that information on operating segments activities essential in all aspects.Results research has as theoretical so and practical significance, and can used at further development theoretical and practical questions on disclosure relevant information of activities organizations of tourist sphere.DOI: http://dx.doi.org/10.12731/2218-7405-2013-1-2

  9. Hubble Captures Volcanic Eruption Plume From Io

    Science.gov (United States)

    1997-01-01

    The Hubble Space Telescope has snapped a picture of a 400-km-high (250-mile-high) plume of gas and dust from a volcanic eruption on Io, Jupiter's large innermost moon.Io was passing in front of Jupiter when this image was taken by the Wide Field and Planetary Camera 2 in July 1996. The plume appears as an orange patch just off the edge of Io in the eight o'clock position, against the blue background of Jupiter's clouds. Io's volcanic eruptions blasts material hundreds of kilometers into space in giant plumes of gas and dust. In this image, material must have been blown out of the volcano at more than 2,000 mph to form a plume of this size, which is the largest yet seen on Io.Until now, these plumes have only been seen by spacecraft near Jupiter, and their detection from the Earth-orbiting Hubble Space Telescope opens up new opportunities for long-term studies of these remarkable phenomena.The plume seen here is from Pele, one of Io's most powerful volcanos. Pele's eruptions have been seen before. In March 1979, the Voyager 1 spacecraft recorded a 300-km-high eruption cloud from Pele. But the volcano was inactive when the Voyager 2 spacecraft flew by Jupiter in July 1979. This Hubble observation is the first glimpse of a Pele eruption plume since the Voyager expeditions.Io's volcanic plumes are much taller than those produced by terrestrial volcanos because of a combination of factors. The moon's thin atmosphere offers no resistance to the expanding volcanic gases; its weak gravity (one-sixth that of Earth) allows material to climb higher before falling; and its biggest volcanos are more powerful than most of Earth's volcanos.This image is a contrast-enhanced composite of an ultraviolet image (2600 Angstrom wavelength), shown in blue, and a violet image (4100 Angstrom wavelength), shown in orange. The orange color probably occurs because of the absorption and/or scattering of ultraviolet light in the plume. This light from Jupiter passes through the plume and is

  10. Choosing your IoT programming framework : architectural aspects

    NARCIS (Netherlands)

    Rahman, L.F.; Ozcelebi, T.; Lukkien, J.J.

    2016-01-01

    The Internet of Things (IoT) is turning into practice. To drive innovations, it is crucial that programmers have means to develop IoT applications in the form of IoT programming frameworks. These are toolkits to develop applications according to a certain style or method and that let developers

  11. Synthesizing Knowledge on Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Liu, Fei; Tan, Chee-Wee; Lim, Eric T. K.

    2016-01-01

    Research on Internet of Things (IoT) has been booming for past couple of years due to technological advances and its potential for application. Nonetheless, the rapid growth of IoT articles as well as the heterogeneous nature of IoT pose challenges in synthesizing prior research on the phenomenon...

  12. A Model of Socially Connected Web Objects for IoT Applications

    Directory of Open Access Journals (Sweden)

    Sajjad Ali

    2018-01-01

    Full Text Available The Internet of Things (IoT is evolving with the connected objects at an unprecedented rate, bringing about enormous opportunities for the future IoT applications as well as challenges. One of the major challenges is to handle the complexity generated by the interconnection of billions of objects. However, Social Internet of Things (SIoT, emerging from the conglomeration of IoT and social networks, has realized an efficient way to facilitate the development of complex future IoT applications. Nevertheless, to fully utilize the benefits of SIoT, a platform that can provide efficient services using social relations among heterogeneous objects is highly required. The web objects enabled IoT environment promotes SIoT features by enabling virtualization using virtual objects and supporting the modularity with microservices. To realize SIoT services, this article proposes an architecture that provides a foundation for the development of lightweight microservices based on socially connected web objects. To efficiently discover web objects and reduce the complexity of service provisioning processes, a social relationship model is presented. To realize the interoperable service operations, a semantic ontology model has been developed. Finally, to evaluate the proposed design, a prototype has been implemented based on a use case scenario.

  13. DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation

    DEFF Research Database (Denmark)

    De Donno, Michele; Dragoni, Nicola; Giaretta, Alberto

    2018-01-01

    of fresh and insecure devices fueled older threats, such as Distributed Denial of Service (DDoS) attacks. In this paper, we first propose an updated and comprehensive taxonomy of DDoS attacks, together with a number of examples on how this classification maps to real-world attacks. Then, we outline...... the current situation of DDoS-enabled malwares in IoT networks, highlighting how recent data support our concerns about the growing in popularity of these malwares. Finally, we give a detailed analysis of the general framework and the operating principles of Mirai, the most disruptive DDoS-capable IoT malware...

  14. NIMS: hotspots on Io during G2

    Science.gov (United States)

    1996-01-01

    The Near Infrared Mapping Spectrometer (NIMS) on the Galileo spacecraft imaged Io at high spectral resolution at a range of 439,000 km (275,000 miles) during the G2 encounter on 7 September 1996. This image shows (on the right) Io as seen in the infrared by NIMS. The image on the left shows the same view from Voyager in 1979. This NIMS image can be compared to the NIMS images from the G1 orbit (June 1996) to monitor changes on Io. The NIMS image is at 4.9 microns, showing thermal emissions from the hotspots. The brightness of the pixels is a function of size and temperature.At least 10 hotspots have been identified and can be matched with surface features. An accurate determination of the position of the hotspot in the vicinity of Shamash Patera is pending. Hotspots are seen in the vicinity of Prometheus, Volund and Marduk, all sites of volcanic plume activity during the Galileo encounters, and also of active plumes in 1979. Temperatures and areas have been calculated for the hotspots shown. Temperatures range from 828 K (1031 F) to 210 K (- 81.4 F). The lowest temperature is significantly higher than the Io background (non-hotspot) surface temperature of about 100 K (-279 F). Hotspot areas range from 6.5 square km (2.5 sq miles) to 40,000 sq km (15,400 sq miles). The hottest hotspots have smallest areas, and the cooler hotspots have the largest areas. NIMS is continuing to observe Io to monitor volcanic activity throughout the Galileo mission.The Galileo mission is managed by the Jet Propulsion Laboratory for NASA's Office of Space Science, Washington, D.C.This image and other images and data received from Galileo are posted on the Galileo mission home page on the World Wide Web at http://galileo.jpl.nasa.gov.

  15. Leveraging BLE and LoRa in IoT Network for Wildlife Monitoring System (WMS)

    NARCIS (Netherlands)

    Ayele, Eyuel Debebe; Das, Kallol; Meratnia, Nirvana; Havinga, Paul J.M.

    2018-01-01

    In this paper we propose a new dual radio IoT network architecture for wildlife monitoring system (WMS). WMS leverages bluetooth low energy (BLE) in low power wide area networks (LPWANs) by dynamically changing the operating radio based on the proximity among herd of wild animals. This approach will

  16. Leveraging BLE and LoRa in IoT Network for Wildlife Monitoring System (WMS)

    NARCIS (Netherlands)

    Ayele, Eyuel Debebe; Das, Kallol; Meratnia, Nirvana; Havinga, Paul J.M.

    2016-01-01

    In this paper we propose a new dual radio IoT network architecture for wildlife monitoring system (WMS). WMS leverages bluetooth low energy (BLE) in low power wide area networks (LPWANs) by dynamically changing the operating radio based on the proximity among herd of wild animals. This approach will

  17. DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation

    Directory of Open Access Journals (Sweden)

    Michele De Donno

    2018-01-01

    Full Text Available The Internet of Things (IoT revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but also brought to the Internet the menace of billions of badly protected and easily hackable objects. Not surprisingly, this sudden flooding of fresh and insecure devices fueled older threats, such as Distributed Denial of Service (DDoS attacks. In this paper, we first propose an updated and comprehensive taxonomy of DDoS attacks, together with a number of examples on how this classification maps to real-world attacks. Then, we outline the current situation of DDoS-enabled malwares in IoT networks, highlighting how recent data support our concerns about the growing in popularity of these malwares. Finally, we give a detailed analysis of the general framework and the operating principles of Mirai, the most disruptive DDoS-capable IoT malware seen so far.

  18. Exploiting Efficient Transpacking for One-Sided Communication and MPI-IO

    Science.gov (United States)

    Mir, Faisal Ghias; Träff, Jesper Larsson

    Based on a construction of socalled input-output datatypes that define a mapping between non-consecutive input and output buffers, we outline an efficient method for copying of structured data. We term this operation transpacking, and show how transpacking can be applied for the MPI implementation of one-sided communication and MPI-IO. For one-sided communication via shared-memory, we demonstrate the expected performance improvements by up to a factor of two. For individual MPI-IO, the time to read or write from file dominates the overall time, but even here efficient transpacking can in some scenarios reduce file I/O time considerably. The reported results have been achieved on a single NEC SX-8 vector node.

  19. Out of core, out of mind: Practical parallel I/O

    Energy Technology Data Exchange (ETDEWEB)

    Womble, D.E.; Greenberg, D.S.; Riesen, R.E.; Wheat, S.R.

    1993-11-01

    Parallel computers are becoming more powerful and more complex in response to the demand for computing power by scientists and engineers. Inevitably, new and more complex I/O systems will be developed for these systems. In particular we believe that the I/O system must provide the programmer with the ability to explcitly manage storage (despite the trend toward complex parallel file systems and caching schemes). One method of doing so is to have a partitioned secondary storage in which each processor owns a logical disk. Along with operating system enhancements which allow overheads such as buffer copying to be avoided and libraries to support optimal remapping of data, this sort of I/O system meets the needs of high performance computing.

  20. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    Science.gov (United States)

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  1. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    Directory of Open Access Journals (Sweden)

    Ki-Wook Kim

    2017-09-01

    Full Text Available Many Internet of Things (IoT services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  2. [Design and Implementation of a Mobile Operating Room Information Management System Based on Electronic Medical Record].

    Science.gov (United States)

    Liu, Baozhen; Liu, Zhiguo; Wang, Xianwen

    2015-06-01

    A mobile operating room information management system with electronic medical record (EMR) is designed to improve work efficiency and to enhance the patient information sharing. In the operating room, this system acquires the information from various medical devices through the Client/Server (C/S) pattern, and automatically generates XML-based EMR. Outside the operating room, this system provides information access service by using the Browser/Server (B/S) pattern. Software test shows that this system can correctly collect medical information from equipment and clearly display the real-time waveform. By achieving surgery records with higher quality and sharing the information among mobile medical units, this system can effectively reduce doctors' workload and promote the information construction of the field hospital.

  3. 42 CFR 433.116 - FFP for operation of mechanized claims processing and information retrieval systems.

    Science.gov (United States)

    2010-10-01

    ... and information retrieval systems. 433.116 Section 433.116 Public Health CENTERS FOR MEDICARE... FISCAL ADMINISTRATION Mechanized Claims Processing and Information Retrieval Systems § 433.116 FFP for operation of mechanized claims processing and information retrieval systems. (a) Subject to 42 CFR 433.113(c...

  4. Multi-fields' coordination information integrated platform for nuclear power plant operation preparation

    International Nuclear Information System (INIS)

    Yuan Chang; Li Yong; Ye Zhiqiang

    2011-01-01

    To realize the coordination in multi-fields' work and information sharing, by applying the method of Enterprise Architecture (EA), the business architecture, functional flow and application architecture of Nuclear Power Plant's operation preparation information integrated platform are designed, which can realize the information sharing and coordination of multi fields. (authors)

  5. Effectiveness of Intraoperative Parathyroid Monitoring (ioPTH) in predicting a multiglandular or malignant parathyroid disease.

    Science.gov (United States)

    Dobrinja, C; Santandrea, G; Giacca, M; Stenner, Elisabetta; Ruscio, Maurizio; de Manzini, Nicolò

    2017-05-01

    The main goal of our study was to confirm the usefulness of intra-operative parathyroid hormone (PTH) monitoring (ioPTH) when using minimally invasive techniques for treatment of sporadic Primary hyperparathyroidism (pHTP). Furthermore, we aimed to evaluate if ioPTH monitoring may help to predict the etiology of primary hyperparathyroidism, especially in malignant or multiglandular parathyroid disease. A retrospective review of 125 consecutive patients with pHPT who underwent parathyroidectomy between 2001 and 2016 at the Department of General Surgery was performed. For each patient, the specific preoperative work-up consisted of: high-resolution US of the neck by a skilled sonographer, sestamibi parathyroid scan, laryngoscopy, and serum measurement of PTH, serum calcium levels, and serum 25(OH)D levels. The study included 125 consecutive patients who underwent surgery for pHPT. At the histological examination, we registered 113 patients with simple adenomatous pathology (90,4%), 5 atypical adenomas (4%), 3 cases of parathyroid carcinoma (2,4%),, , and 4 histological exams of different nature (3,2%). Overall, 6 cases (4,8%) of multiglandular disease were found. We reported 10 cases (8%) of recurrent/persistent hyperparathyroidism: 1/10 in a patient affected by atypical adenoma, 9/10 in patients with benign pathology. Regarding these 10 cases, in three (30%) patients, ioPTH wasn't dosed (only frozen section (FS) exam was taken), in 5 cases (50%) ioPTH dropped more than 50% compared to basal value (false negative results), and in 2 (20%) cases, ioPTH did not drop >50% from the first samples taken, the extemporary exam had confirmed the presence of adenoma and the probable second hyperfunctioning adenoma was not found. IoPTH determinations ensure operative success of surgical resection in almost all hyperfunctioning tissue; in particular it is very important during minimally invasive parathyroidectomy, as it allows avoiding bilateral neck exploration. The use of io

  6. Ranking System for IoT Industry Platform

    OpenAIRE

    Mukherjee, Somshree

    2016-01-01

    The Internet of Things (IoT) has seen a huge growth spurt in the last few years which has resulted in the need for more standardised IoT technology. Because of this, numerous IoT platforms have sprung up that offer a variety of features and use different technologies which may not necessarily be compliant with each other or with other technologies. Companies that wish to enter theIoT market are in constant need to find the most suitable IoT platform for their business and have a certain set o...

  7. Klasifikace v oblasti IoT

    OpenAIRE

    Flégl, Jaroslav

    2017-01-01

    This bachelor thesis is focused on classification of IoT. The aim of this thesis is classifying and categorizing IoT using systematic literature review. Several steps are needed to fulfill this aim. First part of this thesis focuses on defining IoT. Top ten companies, which invest the most to IoT are introduced with their view on IoT. Then follows characterization of classification and categorization including differences between them. Second part focuses on describing SLR. First of all the p...

  8. Establishing the Information System: An Operational Handbook. MOREL Regional Information System for Educators.

    Science.gov (United States)

    Kromer, Charles; Doyle, James

    This document is one of a series describing the background, functions, and utilization of the Regional Information System (RIS), developed by the Michigan-Ohio Regional Educational Laboratory (MOREL). RIS, which was developed to improve the accessibility of information for the educational practitioner, is described in this handbook. The handbook…

  9. Aplikasi Keliling Nusantara Edisi Sumatera Berbasis Android dan iOS

    Directory of Open Access Journals (Sweden)

    Angga Apridianto

    2015-08-01

    Full Text Available Diversity of art and culture in Indonesia should be preserved so as not to become extinct in the face of times so that it can be passed on to generations to come. Many of the people of Indonesia who forget about the culture to identity of the area because of several factors such as the people of indonesia more interested of the western culture than self culture, the region of Indonesia which large also cause people’s reluctance to learn because of constrained of time, distance and cost as well as limitations of the media information about the art and culture that currently can only be learned through pictures and visit the location of art and culture directly make the introduction of art and culture to people of indonesia not yet optimal. Therefore required a media so that people can learn more about the wealth of art and culture without having to visit directly into the location of the arts and cultures its. “Keliling Nusantara Edisi Sumatra” application that was built can be the way to preserve the national culture. The function of this application as a learning media for recognize the diversity of arts and cultures of Indonesia on the island of Sumatra. This application is built using Mobione Studio and running on Android and iOS devices. The application is made using the UCD (User Centered Design which has been mapped to multimedia development methods by Luther from the stage specify the context of use and specify the users and organisational requirements are mapped into the concept, the stage produce design solutions are mapped into the design, production and collecting material as wellas the evaluate design againts the user requirements are mapped into the stage of testing and distribution. The results produced an application based on Android and iOS contains folks song and lyrics and sound, traditional dress, traditional homes, custom traditions, traditional weapons, traditional dance, tradition musical instrument, the symbol of the

  10. Intra-operative 3-T MRI for paediatric brain tumours: challenges and perspectives

    International Nuclear Information System (INIS)

    Abernethy, L.J.; Avula, S.; Hughes, G.M.; Wright, E.J.; Mallucci, C.L.

    2012-01-01

    MRI is the ideal modality for imaging intracranial tumours. Intraoperative MRI (ioMRI) makes it possible to obtain scans during a neurosurgical operation that can aid complete macroscopic tumour resection - a major prognostic factor in the majority of brain tumours in children. Intra-operative MRI can also help limit damage to normal brain tissue. It therefore has the potential to improve the survival of children with brain tumours and to minimise morbidity, including neurological deficits. The use of ioMRI is also likely to reduce the need for second look surgery, and may reduce the need for chemotherapy and radiotherapy. High-field MRI systems provide better anatomical information and also enable effective utilisation of advanced MRI techniques such as perfusion imaging, diffusion tensor imaging, and magnetic resonance spectroscopy. However, high-field ioMRI facilities require substantial capital investment, and careful planning is required for optimal benefit. Safe ioMRI requires meticulous attention to detail and rigorous application of magnetic field safety precautions. Interpretation of ioMRI can be challenging and requires experience and understanding of artefacts that are common in the intra-operative setting. (orig.)

  11. On Formal and Informal Factors: Enabling Learning for Safe Offshore Drilling Operations

    Directory of Open Access Journals (Sweden)

    Trygve J. Steiro

    2017-12-01

    Full Text Available Traditional safety thinking has been concerned with investigating accident causations in order to learn from these. However, successful operations constitute the great majority of all the operations. It would thus be interesting to add a focus towards learning from operations that go well. The purpose of the current study is to identify factors that might contribute to successful operations in terms of safety. This purpose is approached by an empirical study consisting of 10 interviews with people who work on board a drilling rig currently operating in Norway. The informants who participated in the interviews hold different positions and come from different companies represented on board the rig. The findings in this study show that it can be difficult to characterize or define successful operations. The definition will be subjective; however, there are some common features of successful operations. Maintaining the life and health of people are the number one priority. A successful operation should also result in the intended product even though it might take some more time than planned. A successful operation is created by many factors and conditions. This study identified 27 factors that might contribute to successful operations in terms of safety. A lot of the theory explaining successful operations focuses on informal factors related to humans and their actions. However, the findings in this study implies that there must be both formal and informal factors present.

  12. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    Directory of Open Access Journals (Sweden)

    Antonio F. Gomez Skarmeta

    2013-11-01

    Full Text Available Internet of Things (IoT networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA has been standardized by the Internet engineering task force (IETF to carry the Extensible Authentication Protocol (EAP, which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1 to demonstrate the feasibility of EAP/PANA in IoT devices; (2 to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS, called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  13. PANATIKI: a network access control implementation based on PANA for IoT devices.

    Science.gov (United States)

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  14. Reliable IoT Storage: Minimizing Bandwidth Use in Storage Without Newcomer Nodes

    DEFF Research Database (Denmark)

    Zhao, Xiaobo; Lucani Rötter, Daniel Enrique; Shen, Xiaohong

    2018-01-01

    This letter characterizes the optimal policies for bandwidth use and storage for the problem of distributed storage in Internet of Things (IoT) scenarios, where lost nodes cannot be replaced by new nodes as is typically assumed in Data Center and Cloud scenarios. We develop an information flow...... model that captures the overall process of data transmission between IoT devices, from the initial preparation stage (generating redundancy from the original data) to the different repair stages with fewer and fewer devices. Our numerical results show that in a system with 10 nodes, the proposed optimal...

  15. An Open Virtual Neighbourhood Network to Connect IoT Infrastructures and Smart Objects – VICINITY

    DEFF Research Database (Denmark)

    Guan, Yajuan; Quintero, Juan Carlos Vasquez; Guerrero, Josep M.

    2017-01-01

    The lack of interoperability is considered as the most important barrier to achieve the global integration of Internet-of-Things (IoT) ecosystems across borders of different disciplines, vendors and standards. Indeed, the current IoT landscape consists of a large set of isolated islands that do...... not constitute a real Internet, preventing the exploitation of the huge potential expected by Information and communications technology (ICT) visionaries and unfolding business opportunities facilitated by digitalization and automation. The VICINITY project will build and demonstrate a platform linking various...

  16. Information Operations

    Science.gov (United States)

    2006-02-13

    restricted frequency list (JRFL). This list specifies protected, guarded, and taboo frequencies that should not normally be disrupted without prior... frequency list JROC Joint Requirement Oversight Council JSC Joint Spectrum Center JTCB joint targeting coordination board JTF joint task force JWAC joint

  17. Quantitative assessment of information load on control room operator in emergency situations

    International Nuclear Information System (INIS)

    Filshtein, E.L.

    1986-01-01

    The information processing by the operator in reading-from-display mode is addressed with the following conclusions: 1) The information measure which is needed should be translatable into the time requirements and as such, should reflect the peculiarities associated with mental information processing abilities. 2) The Information Processing Unit (IPU) is introduced as a measure that reflects the peculiarities and, therefore, is better than the Information Entropy unit (H) for the problem under consideration. 3) All the messages that the operator might encounter are classified as belonging to one of three types, and the amount of processing information is quantified in the Information Processing Units (IPU). 4) A pilot study has been conducted to verify underlined assumptions and to evaluate the rate of information processing in reading-from-display mode

  18. Volcanism on Jupiter's moon Io and its relation to interior processes

    Science.gov (United States)

    Hamilton, Christopher

    2013-04-01

    Jupiter's moon Io is the most volcanically active body in the Solar System and offers insight into processes of tidal heating, melt generation, and magma ascent. Investigating these processes contributes to a better understanding of Io's geologic history, internal structure, and tidal dissipation mechanisms, as well as to understanding similar processes operating on other tidally-heated worlds (e.g., Europa, Enceladus, and some exoplanets). Four recent developments provide new observational constraints that prompt re-examination of the relationships between Io's surficial geology and interior structure. These developments include: (1) completion of the first 1:15,000,000 scale geologic map of Io based on a synthesis of Voyager and Galileo data; (2) re-interpretation of Galileo magnetometer data, which suggests that Io has a globally continuous subsurface magma ocean; (3) new global surveys of the power output from volcanic centers on Io; and (4) identification of an offset between volcano concentrations and surface heat flux maxima predicted by solid body tidal heating models. In this study, the spatial distributions of volcanic hotspots and paterae on Io are characterized using distance-based clustering techniques and nearest neighbor statistics. Distance-based clustering results support a dominant role for asthenospheric heating within Io, but show a 30-60° eastward offset in volcano concentrations relative to locations of predicted surface heat flux maxima. The observed asymmetry in volcano concentrations, with respect to the tidal axis, cannot be explained by existing solid body tidal heating models. However, identification of a global magma ocean within Io raises the intriguing possibility that a fluid tidal response—analogous to the heating of icy satellites by fluid tidal dissipation in their liquid oceans—may modify Io's thermal budget and locations of enhanced volcanism. The population density of volcanoes is greatest near the equator, which also

  19. Improving emergency management through shared information processing - considerations in Emergency Operations Center design

    International Nuclear Information System (INIS)

    DeBusk, R.E.; Walker, J.A.

    1987-01-01

    An Emergency Operations Center (EOC) is a shared information processing facility. Although seemingly obvious, many EOCs are designed and operated based on other criteria. The results, measured in terms of response effectiveness, are difficult to determine. A review of some recent disasters reveals a pattern of poor performance for the EOCs involved. These conclusions are tentative because so little research has been done on the design, operation, or evaluation of emergency operations centers. The EOC is not an onsite response command post but a facility removed from the response where tactical and strategic decisions are made based on information from the response site and elsewhere. The EOC is therefore the central focus of emergency information processing and higher-level decision making. Examining existing EOCs, several common functions emerge. These functions can be described in terms of shared information processing. However, many factors impact the design and operation of EOCs. Politics, budgets, and personal ambition are only a few such factors. Examining EOC design and operation in terms of shared information processing operationalized in the seven principal functions within the EOC provides a framework for establishing principles of EOC design and operation. In the response to emergencies such as Bhopal or Chernobyl the stakes are high. Applying new techniques and technologies of management systems can improve the probability of success. This research is a beginning step - to understand how EOCs function, to define the system. Predictive or prescriptive analysis must wait until sufficient empirical data is available to complete a descriptive model for EOC operations

  20. Flexible and adaptive water systems operations through more informed and dynamic decisions

    Science.gov (United States)

    Castelletti, A.; Giuliani, M.

    2016-12-01

    Timely adapting the operations of water systems to be resilient against rapid changes in both hydroclimatic and socioeconomic forcing is generally recommended as a part of planning and managing water resources under uncertain futures. A great opportunity to make the operations more flexible and adaptive is offered by the unprecedented amount of information that is becoming available to water system operators, providing a wide range of data at increasingly higher temporal and spatial resolution. Yet, many water systems are still operated using very simple information systems, typically based on basic statistical analysis and the operator's experience. In this work, we discuss the potential offered by incorporating improved information to enhance water systems operation and increase their ability of adapting to different external conditions and resolving potential conflicts across sectors. In particular, we focus on the use of different variables associated to different dynamics of the system (slow and fast) diversely impacting the operating objectives on the short-, medium- and long-term. The multi-purpose operations of the Hoa Binh reservoir in the Red River Basin (Vietnam) is used to demonstrate our approach. Numerical results show that our procedure is able to automatically select the most valuable information for improving the Hoa Binh operations and mitigating the conflict between short-term objectives, i.e. hydropower production and flood control. Moreover, we also successfully identify low-frequency climate information associated to El-Nino Southern Oscillation for improving the performance in terms of long-term objectives, i.e. water supply. Finally, we assess the value of better informing operational decisions for adapting the system operations to changing conditions by considering different climate change projections.

  1. Massing Effects in the Information Domain: A Case Study in Aggressive Information Operations

    National Research Council Canada - National Science Library

    Metz, Thomas F; Garrett, Mark W; Hutton, James E; Bush, Timothy W

    2006-01-01

    In 1995, the Department of the Army, Forces Command, and the Training and Doctrine Command began a joint venture called Force XXI, the focus of which was to understand how information-age technology could improve the U.S...

  2. An information offering system for operation support based on plant functional structure

    International Nuclear Information System (INIS)

    Ohga, Yukiharu; Seki, Hiroshi

    1995-01-01

    A plant information offering system was proposed to support operators in their selection and confirmation of the required information for plant operation under transient conditions in nuclear power plants. The system features include an automatic selection method for information and a dialog input method. The former selects plant information in response to plant status changes and operators' demands. The selection is performed based on the knowledge and data as structured by the plant functional structure; i.e. a means-ends abstraction hierarchy model. In the latter, both speech and CRT touch inputs are transformed into words in Japanese to realize an arbitrary input mode combination. The words are analyzed as a sentence before transforming them into a demand for related programs. A prototype system was evaluated using a BWR simulator, assuming abnormal transients such as loss of feedwater. The contents of the offered information were checked based on emergency operation guidelines. It was confirmed that appropriate information items are automatically selected in real time. Answers are generated in reply to the operators' demands. They include information added to reflect the plant conditions. As for dialog, simple and quick input is realized by combining speech and CRT touch according to the operating situation. (author)

  3. ULMAP: Ultralightweight NFC Mutual Authentication Protocol with Pseudonyms in the Tag for IoT in 5G

    Directory of Open Access Journals (Sweden)

    Kai Fan

    2017-01-01

    Full Text Available As one of the core techniques in 5G, the Internet of Things (IoT is increasingly attracting people’s attention. Meanwhile, as an important part of IoT, the Near Field Communication (NFC is widely used on mobile devices and makes it possible to take advantage of NFC system to complete mobile payment and merchandise information reading. But with the development of NFC, its problems are increasingly exposed, especially the security and privacy of authentication. Many NFC authentication protocols have been proposed for that, some of them only improve the function and performance without considering the security and privacy, and most of the protocols are heavyweight. In order to overcome these problems, this paper proposes an ultralightweight mutual authentication protocol, named ULMAP. ULMAP only uses Bit and XOR operations to complete the mutual authentication and prevent the denial of service (DoS attack. In addition, it uses subkey and subindex number into its key update process to achieve the forward security. The most important thing is that the computation and storage overhead of ULMAP are few. Compared with some traditional schemes, our scheme is lightweight, economical, practical, and easy to protect against synchronization attack.

  4. Galileo SSI and Cassini ISS Observations of Io's Pele Hotspot: Temperatures, Areas, and Variation with Time

    Science.gov (United States)

    Radebaugh, J.; McEwen, A. S.; Milazzo, M.; Davies, A. G.; Keszthelyi, L. P.; Geissler, P.

    2002-01-01

    Temperatures of Io's Pele hotspot were found using dual-filter observations from Galileo and Cassini. Temperatures average 1375 K, but vary widely over tens of minutes. Dropoff in emission with rotation consistent with lava fountaining at a lava lake. Additional information is contained in the original extended abstract.

  5. The War of Ideas and the Role of Information Operations in Counterinsurgency

    National Research Council Canada - National Science Library

    Hunton, Collin T

    2008-01-01

    .... Given the influence of policy at home and abroad within the asymmetric nature of COIN operations, a review of Clausewitz's theory of political conflict will help us understand the role of information...

  6. Information sharing guidebook for transportation management centers, emergency operations centers, and fusion centers

    Science.gov (United States)

    2010-06-01

    This guidebook provides an overview of the mission and functions of transportation management centers, emergency operations centers, and fusion centers. The guidebook focuses on the types of information these centers produce and manage and how the sh...

  7. 76 FR 63941 - Agency Information Collection Activities: Business Transformation-Automated Integrated Operating...

    Science.gov (United States)

    2011-10-14

    ... Activities: Business Transformation--Automated Integrated Operating Environment (IOE), New Information... Internet by federal agencies through efforts like USCIS' Business Transformation initiative. The USCIS ELIS... the USCIS Business Transformation initiative and wizard technology. The supporting statement can be...

  8. 76 FR 17145 - Agency Information Collection Activities: Business Transformation-Automated Integrated Operating...

    Science.gov (United States)

    2011-03-28

    ... Collection Activities: Business Transformation--Automated Integrated Operating Environment (IOE), New... through efforts like USCIS' Business Transformation initiative. The IOE will be implemented by USCIS and... information collection. (2) Title of the Form/Collection: Business Transformation-- Automated Integrated...

  9. Information Operations: The Least Applied Element of U.S. National Power

    National Research Council Canada - National Science Library

    Ferguson, Quill

    2004-01-01

    Information operations, one of the four elements of U.S. national power, is supreme in defending the country against foreign or domestic adversaries and winning hearts and minds both at home and internationally...

  10. Information sharing guidebook for transportation management centers, emergency operations centers, and fusion centers.

    Science.gov (United States)

    2010-06-01

    This guidebook provides an overview of the mission and functions of transportation management centers, emergency operations centers, and fusion centers. The guidebook focuses on the types of information these centers produce and manage and how the sh...

  11. Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues

    National Research Council Canada - National Science Library

    Wilson, Clay

    2007-01-01

    .... It also suggests related policy issues of potential interest to Congress. For military planners, the control of information is critical to military success, and communications networks and computers are of vital operational importance...

  12. On possible life on Jupiter's satellite Io

    Science.gov (United States)

    Vidmachenko, A. P.

    2018-05-01

    Some of the satellites of Jupiter may well be suitable both for mastering, and for finding possible traces of life there. Among them such satellite like Io - nearest Galilean satellite of Jupiter, and one of the most volcanically active bodies in the solar system. Warming of the mantle is caused by a powerful tidal force from the side of Jupiter. This leads to the heating of some parts of the mantle to a temperature above 1800 K, with an average surface temperature of about 140 K. But under its surface can be safe and even comfortable shelters, where life could once have come from the outside (even in a very primitive form), and could survive to this day. Moreover, according to some model's assumptions, Io could sometime be formed in another part of the Solar system, where the water could exist. Note that on neighboring Galilean satellites now exist significant amounts of water .

  13. A remote control system to offer information for nuclear power plant operation

    International Nuclear Information System (INIS)

    Ohga, Yukiharu; Yuchi, Hiroyuki; Arita, Setsuo

    1995-01-01

    A new man-machine system was proposed to simplify input operation so as to get needed plant information and to control information items and output devices for the operator crew, working in a control room. The system controls the shared information for the operator crew, on a large screen display, and private information for individual operators and maintenance personnel, on CRTs, based on the speech input and remote pointing input to the large screen display by a portable pointer, which emits laser beams. The system recognizes the indicating point of the pointer beam by processing the image on the large screen as obtained by an ITV camera. An infrared laser beam and a camera with a visible ray cut filter are used to remove distortion of the image caused by lens aberration, etc. and to provide rapid image processing. The operator performs the input operation while monitoring a cursor displayed by the system. The information items offered and their output devices are automatically determined according to the input operator. A prototype system was developed using three CRTs, one of which served as a substitute for the large screen display. Input to the system is performed using a speech input device and three kinds of pointers; each pointer is identified during image processing based on the number of laser beams emitted. The evaluation test confirmed that precise and smooth input by pointers as well as arbitrary combinations with speech input realized natural dialog without being aware of any waiting time. The appropriate information items were offered to output devices, CRTs and the speech output device, according to the pointers used, namely the input operators. The system can simplify input operation and effectively control the offered information items and output devices in a plant control room. (author)

  14. Organizational structure and operation of defense/aerospace information centers in the United States of America

    Science.gov (United States)

    Sauter, H. E.; Lushina, L. N.

    1983-01-01

    U.S. Government aerospace and defense information centers are addressed. DTIC and NASA are described in terms of their history, operational authority, information services provided, user community, sources of information collected, efforts under way to improve services, and external agreements regarding the exchange of documents and/or data bases. Contents show how DTIC and NASA provide aerospace/defense information services in support of U.S. research and development efforts. In a general introduction, the importance of scientific and technical information and the need for information centers to acquire, handle, and disseminate it are stressed.

  15. Galileo observations of volcanic plumes on Io

    Science.gov (United States)

    Geissler, P.E.; McMillan, M.T.

    2008-01-01

    Io's volcanic plumes erupt in a dazzling variety of sizes, shapes, colors and opacities. In general, the plumes fall into two classes, representing distinct source gas temperatures. Most of the Galileo imaging observations were of the smaller, more numerous Prometheus-type plumes that are produced when hot flows of silicate lava impinge on volatile surface ices of SO2. Few detections were made of the giant, Pele-type plumes that vent high temperature, sulfur-rich gases from the interior of Io; this was partly because of the insensitivity of Galileo's camera to ultraviolet wavelengths. Both gas and dust spout from plumes of each class. Favorably located gas plumes were detected during eclipse, when Io was in Jupiter's shadow. Dense dust columns were imaged in daylight above several Prometheus-type eruptions, reaching heights typically less than 100 km. Comparisons between eclipse observations, sunlit images, and the record of surface changes show that these optically thick dust columns are much smaller in stature than the corresponding gas plumes but are adequate to produce the observed surface deposits. Mie scattering calculations suggest that these conspicuous dust plumes are made up of coarse grained “ash” particles with radii on the order of 100 nm, and total masses on the order of 106 kg per plume. Long exposure images of Thor in sunlight show a faint outer envelope apparently populated by particles small enough to be carried along with the gas flow, perhaps formed by condensation of sulfurous “snowflakes” as suggested by the plasma instrumentation aboard Galileo as it flew through Thor's plume [Frank, L.A., Paterson, W.R., 2002. J. Geophys. Res. (Space Phys.) 107, doi:10.1029/2002JA009240. 31-1]. If so, the total mass of these fine, nearly invisible particles may be comparable to the mass of the gas, and could account for much of Io's rapid resurfacing.

  16. Automatic Integration of IoT Devices

    OpenAIRE

    Pêgo, Pedro Ruben Januário

    2016-01-01

    During the last years a new concept has gained prominence in the technology world. With an increasingly dominant role in our days, Internet of Things (IoT) is a technological revolution that is changing our lives. The imagination is the limit for the new devices that may appear in the market. This phenomenon is derived from both, the technological evolution and the growing acceptance of this type of products in our social life. Faced with a fast growth, an increasing diversity ...

  17. Improving machine operation management efficiency via improving the vehicle park structure and using the production operation information database

    Science.gov (United States)

    Koptev, V. Yu

    2017-02-01

    The work represents the results of studying basic interconnected criteria of separate equipment units of the transport network machines fleet, depending on production and mining factors to improve the transport systems management. Justifying the selection of a control system necessitates employing new methodologies and models, augmented with stability and transport flow criteria, accounting for mining work development dynamics on mining sites. A necessary condition is the accounting of technical and operating parameters related to vehicle operation. Modern open pit mining dispatching systems must include such kinds of the information database. An algorithm forming a machine fleet is presented based on multi-variation task solution in connection with defining reasonable operating features of a machine working as a part of a complex. Proposals cited in the work may apply to mining machines (drilling equipment, excavators) and construction equipment (bulldozers, cranes, pile-drivers), city transport and other types of production activities using machine fleet.

  18. 76 FR 3175 - Proposed Extension of Existing Information Collection; Hoist Operators' Physical Fitness

    Science.gov (United States)

    2011-01-19

    ... Extension of Existing Information Collection; Hoist Operators' Physical Fitness AGENCY: Mine Safety and... fitness. DATES: All comments must be received by midnight Eastern Standard Time on March 21, 2011... 56.19057 and 57.19057 require the annual examination and certification of hoist operators' fitness by...

  19. 75 FR 29568 - Extension of Agency Information Collection Activity Under OMB Review: Aircraft Operator Security

    Science.gov (United States)

    2010-05-26

    ... all passengers. The passenger watch list checks currently conducted by aircraft operators will soon be.... These programs require aircraft operators to maintain and update records to ensure compliance with... information collected to determine compliance with 49 CFR part 1544 and to ensure the freedom of movement for...

  20. Combining Operations Management and Information Systems Curricula: Assessing Alumni Preparations for the Workforce

    Science.gov (United States)

    Silva, David; McFadden, Kathleen L.

    2005-01-01

    The purpose of this study is to explore how well a curriculum that combines operations management and information systems uniquely prepares students for the workforce. To address our research questions, a Web-based survey was developed. We sent our survey to 203 alumni that graduated from the Department of Operations Management and Information…

  1. Coexistence or Operational Necessity: The Role of Formally Structured Organisation and Informal Networks during Deployments

    Science.gov (United States)

    2011-06-01

    Problems need innovative solutions and agile collaboration across boundaries and norms to configure customised approaches at the local level. While... customised capabilities. Thus a context or operational environment can be understood as one that will generally generate certain types of problems...Lack of critical mass of research into informal networks in the military during operational circumstances; • anecdotal evidence (Cause, Ritcher et

  2. Operation environment construction of geological information database for high level radioactive waste geological disposal

    International Nuclear Information System (INIS)

    Wang Peng; Gao Min; Huang Shutao; Wang Shuhong; Zhao Yongan

    2014-01-01

    To fulfill the requirements of data storage and management in HLW geological disposal, a targeted construction method for data operation environment was proposed in this paper. The geological information database operation environment constructed by this method has its unique features. And it also will be the important support for HLW geological disposal project and management. (authors)

  3. Stability of sulfur slopes on Io

    Science.gov (United States)

    Clow, G. D.; Carr, M. H.

    1980-01-01

    The mechanical properties of elemental sulfur are such that the upper crust of Io cannot be primarily sulfur. For heat flows in the range 100-1000 ergs/sq cm sec sulfur becomes ductile within several hundred meters of the surface and would prevent the formation of calderas with depths greater than this. However, the one caldera for which precise depth data are available is 2 km deep, and this value may be typical. A study of the mechanical equilibrium of simple slopes shows that the depth to the zone of rapid ductile flow strongly controls the maximum heights for sulfur slopes. Sulfur scarps with heights greater than 1 km will fail for all heat flows greater than 180 ergs/sq cm sec and slope angles greater than 22.5 deg. The observed relief on Io is inconsistent with that anticipated for a predominantly sulfur crust. However, a silicate crust with several percent sulfur included satisfies both the mechanical constraints and the observed presence of sulfur on Io.

  4. Design and Implementation of Cloud-Centric Configuration Repository for DIY IoT Applications.

    Science.gov (United States)

    Ahmad, Shabir; Hang, Lei; Kim, Do Hyeun

    2018-02-06

    The Do-It-Yourself (DIY) vision for the design of a smart and customizable IoT application demands the involvement of the general public in its development process. The general public lacks the technical knowledge for programming state-of-the-art prototyping and development kits. The latest IoT kits, for example, Raspberry Pi, are revolutionizing the DIY paradigm for IoT, and more than ever, a DIY intuitive programming interface is required to enable the masses to interact with and customize the behavior of remote IoT devices on the Internet. However, in most cases, these DIY toolkits store the resultant configuration data in local storage and, thus, cannot be accessed remotely. This paper presents the novel implementation of such a system, which not only enables the general public to customize the behavior of remote IoT devices through a visual interface, but also makes the configuration available everywhere and anytime by leveraging the power of cloud-based platforms. The interface enables the visualization of the resources exposed by remote embedded resources in the form of graphical virtual objects (VOs). These VOs are used to create the service design through simple operations like drag-and-drop and the setting of properties. The configuration created as a result is maintained as an XML document, which is ingested by the cloud platform, thus making it available to be used anywhere. We use the HTTP approach for the communication between the cloud and IoT toolbox and the cloud and real devices, but for communication between the toolbox and actual resources, CoAP is used. Finally, a smart home case study has been implemented and presented in order to assess the effectiveness of the proposed work.

  5. Design and Implementation of Cloud-Centric Configuration Repository for DIY IoT Applications

    Directory of Open Access Journals (Sweden)

    Shabir Ahmad

    2018-02-01

    Full Text Available The Do-It-Yourself (DIY vision for the design of a smart and customizable IoT application demands the involvement of the general public in its development process. The general public lacks the technical knowledge for programming state-of-the-art prototyping and development kits. The latest IoT kits, for example, Raspberry Pi, are revolutionizing the DIY paradigm for IoT, and more than ever, a DIY intuitive programming interface is required to enable the masses to interact with and customize the behavior of remote IoT devices on the Internet. However, in most cases, these DIY toolkits store the resultant configuration data in local storage and, thus, cannot be accessed remotely. This paper presents the novel implementation of such a system, which not only enables the general public to customize the behavior of remote IoT devices through a visual interface, but also makes the configuration available everywhere and anytime by leveraging the power of cloud-based platforms. The interface enables the visualization of the resources exposed by remote embedded resources in the form of graphical virtual objects (VOs. These VOs are used to create the service design through simple operations like drag-and-drop and the setting of properties. The configuration created as a result is maintained as an XML document, which is ingested by the cloud platform, thus making it available to be used anywhere. We use the HTTP approach for the communication between the cloud and IoT toolbox and the cloud and real devices, but for communication between the toolbox and actual resources, CoAP is used. Finally, a smart home case study has been implemented and presented in order to assess the effectiveness of the proposed work.

  6. Seedbed based on IoT: A Case Study

    Directory of Open Access Journals (Sweden)

    J. Kalathas

    2016-05-01

    Full Text Available Nowadays, the Wireless Sensors Network (WSN and the Internet of Things (IOT are widely used in providing decision support systems which solve many problems in the real-world. This paper presents IoT as the best way to solve the agricultural problems, related to seedbed resources optimization, decision making support and seed breeding monitoring. This case study provides real-time information about the seedbed that will help agriculturists make the right decisions during the seed breeding procedure. Using the basic principles of Internet and WSN technology, precision agriculture systems based on the Internet of Things (IoT technology are explained in detail, especially in network architecture, hardware architecture and software process control of the precision seed breeding monitoring system. The implemented automation system monitors data from the sensors in a feedback loop which activates the control devices based on threshold value. The implementation of WSN in seedbed monitoring (SM will optimize the control of air temperature and humidity, soil humidity, air capacity, luminance while it will minimize the time of seed breeding and it will also maximize the number of seeds which become plants ready for transplantation.

  7. An IoT Project for Vital Signs Monitoring

    Directory of Open Access Journals (Sweden)

    Felician ALECU

    2017-01-01

    Full Text Available Nowadays, the Internet of Things (IoT projects are very popular and they are developed for numerous fields. In order to detect various medical problems on time, it is required to monitor the subjects either human or non-human. This could be used on regular or specific activities, like sport or work. It is necessary to determine the factors that could lead to medical problems. Another important aspect is to quantify the factors, to monitor them, to collect data and to make the proper interpretation. This could be achieved using dedicated sensors, controlled by an application embedded on a development board. When a dangerous value is reached, the system has to inform the subject (if human or someone else (if non-human. This paper presents an Arduino based IoT project used for monitoring the vital signs for human and non-human and the results based on its usage. The paper details the hardware and software components of this project.

  8. Meeting the reactor operator's information needs using functional analysis

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, W.R.; Clark, M.T.

    1980-01-01

    Since the accident at Three Mile Island, many ideas have been proposed for assisting the reactor operator during emergency situations. However, some of the suggested remedies do not alleviate an important shortcoming of the TMI control room: the operators were not presented with the information they needed in a manner which would allow prompt diagnosis of the problem. To address this problem, functional analysis is being applied at the LOFT facility to ensure that the operator's information needs are being met in his procedures and graphic displays. This paper summarizes the current applications of functional analysis at LOFT.

  9. 17 CFR 39.5 - Information relating to derivatives clearing organization operations.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Information relating to derivatives clearing organization operations. 39.5 Section 39.5 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION DERIVATIVES CLEARING ORGANIZATIONS § 39.5 Information relating to derivatives...

  10. 39 CFR 3.6 - Information furnished to Board-financial and operating reports.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Information furnished to Board-financial and operating reports. 3.6 Section 3.6 Postal Service UNITED STATES POSTAL SERVICE THE BOARD OF GOVERNORS OF THE U.S. POSTAL SERVICE BOARD OF GOVERNORS (ARTICLE III) § 3.6 Information furnished to Board—financial...

  11. 47 CFR 25.263 - Information sharing requirements for SDARS terrestrial repeater operators.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Information sharing requirements for SDARS terrestrial repeater operators. 25.263 Section 25.263 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES SATELLITE COMMUNICATIONS Technical Standards § 25.263 Information sharing...

  12. The integrated business information system: using automation to monitor cost-effectiveness of park operations

    Science.gov (United States)

    Dick Stanley; Bruce Jackson

    1995-01-01

    The cost-effectiveness of park operations is often neglected because information is laborious to compile. The information, however, is critical if we are to derive maximum benefit from scarce resources. This paper describes an automated system for calculating cost-effectiveness ratios with minimum effort using data from existing data bases.

  13. 33 CFR 157.150 - Crude Oil Washing Operations and Equipment Manual: Recording information after inspections.

    Science.gov (United States)

    2010-07-01

    ... Equipment Manual: Recording information after inspections. 157.150 Section 157.150 Navigation and Navigable... Vessels Inspections § 157.150 Crude Oil Washing Operations and Equipment Manual: Recording information... machines. (2) Revolutions, number of cycles, and length of cycles of each COW machine. (3) Pressure and...

  14. Mands for information using "who?" and "which?" in the presence of establishing and abolishing operations.

    Science.gov (United States)

    Shillingsburg, M Alice; Bowen, Crystal N; Valentino, Amber L; Pierce, Laura E

    2014-01-01

    Treatments designed to teach mands for information have included prompting and differential reinforcement, as well as procedures to manipulate the relevant establishing operation (EO). However, previous studies have not included relevant abolishing operation (AO) conditions to ensure that the mand is under relevant antecedent control. Data on listener responses (i.e., use of the information) are also absent in the literature. The current study shows differential responding under EO and AO conditions and reports listener responses that demonstrate use of the provided information. Three participants, diagnosed with an autism spectrum disorder, learned to mand for information using "who?" and "which?" questions exclusively under EO conditions. In addition, each participant responded to the information provided to access a preferred item. Generalization of the "which?" mand for information was also demonstrated across novel stimuli. © Society for the Experimental Analysis of Behavior.

  15. Design tools for computer-generated display of information to operators

    International Nuclear Information System (INIS)

    O'Brien, J.F.; Cain, D.G.; Sun, B.K.H.

    1985-01-01

    More and more computers are being used to process and display information to operators who control nuclear power plants. Implementation of computer-generated displays in power plant control rooms represents a considerable design challenge for industry designers. Over the last several years, the EPRI has conducted research aimed at providing industry designers tools to meet this new design challenge. These tools provide guidance in defining more 'intelligent' information for plant control and in developing effective displays to communicate this information to the operators. (orig./HP)

  16. Information diffused by the operator on the nuclear risk: which answer to stakeholders expectations?

    International Nuclear Information System (INIS)

    Plot-Vicard, Emmanuelle

    2010-01-01

    This research thesis addresses the practices of environmental information diffusion, and aims at identifying the possible discrepancies between information diffused by a company and the expectations of stakeholders, more particularly in the case of the nuclear risk. The first part presents the theoretical framework (notably the legitimacy theory) and determines the expectations of stakeholders as far as information on the nuclear risk is concerned. The second part describes and discusses information on nuclear risk diffused by operators in their annual reports, proposes an assessment of this information, and relates this assessment with the previous theoretical framework

  17. Technology and Policy Challenges in the Adoption and Operation of Health Information Exchange Systems.

    Science.gov (United States)

    Ji, Hyerim; Yoo, Sooyoung; Heo, Eun-Young; Hwang, Hee; Kim, Jeong-Whun

    2017-10-01

    This study aimed to identify problems and issues that arise with the implementation of online health information exchange (HIE) systems in a medical environment and to identify solutions to facilitate the successful operation of future HIE systems in primary care clinics and hospitals. In this study, the issues that arose during the establishment and operation of an HIE system in a hospital were identified so that they could be addressed to enable the successful establishment and operation of a standard-based HIE system. After the issues were identified, they were reviewed and categorized by a group of experts that included medical information system experts, doctors, medical information standard experts, and HIE researchers. Then, solutions for the identified problems were derived based on the system development, operation, and improvement carried out during this work. Twenty-one issues were identified during the implementation and operation of an online HIE system. These issues were then divided into four categories: system architecture and standards, documents and data items, consent of HIE, and usability. We offer technical and policy recommendations for various stakeholders based on the experiences of operating and improving the online HIE system in the medical field. The issues and solutions identified in this study regarding the implementation and operate of an online HIE system can provide valuable insight for planners to enable them to successfully design and operate such systems at a national level in the future. In addition, policy support from governments is needed.

  18. A work process and information flow description of control room operations

    International Nuclear Information System (INIS)

    Davey, E.; Matthews, G.

    2007-01-01

    The control room workplace is the location from which all plant operations are supervised and controlled on a shift-to-shift basis. The activities comprising plant operations are structured into a number of work processes, and information is the common currency that is used to convey work requirements, communicate business and operating decisions, specify work practice, and describe the ongoing plant and work status. This paper describes the motivation for and early experience with developing a work process and information flow model of CANDU control room operations, and discusses some of the insights developed from model examination that suggest ways in which changes in control centre work specification, organization of resources, or asset layout could be undertaken to achieve operational improvements. (author)

  19. Construction Operations Building Information Exchange (COBIE): Requirements Definition and Pilot Implementation Standard

    Science.gov (United States)

    2007-06-01

    Swalley U.S. Department of State, Overseas Buildings Operations Toby Wilson U.S. Army, Corps of Engineers, Engineer R&D Center Jeff Wix AEC3 The...exchanged in COBIE. To map those information exchanges to the IFC model, the Information Delivery Manual (IDM) process [ Wix 2007] was also used. The...Folksonomy. Wikimedia Foundation. http://en.wikipedia.org/wiki/Folksonomy/, accessed 3 August 2007. Wix , Jeffrey. 2007. Information Delivery Manual

  20. Information Design for Synchronization and Co-ordination of Modern, Complex, Multi-National Operations

    Science.gov (United States)

    2011-06-01

    1 16th ICCRTS Information design for synchronization and co-ordination of modern, complex, multi- national operations “Collective C2 in...REPORT DATE JUN 2011 2. REPORT TYPE 3. DATES COVERED 00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE Information design for synchronization and co...at 11th ICCRTS) who emphasise that information needs to be designed, not merely found or catalogued, to achieve synchronizations and co-ordinations

  1. Penerapan Action RPG pada Perangkat Mobile Berbasiskan iOS

    Directory of Open Access Journals (Sweden)

    Budi Yulianto

    2011-12-01

    Full Text Available Mobile games develop along with technological developments. Gaming applications by applying special graphics technologies optimizes any mobile device. The purpose of this study is to design an Action RPG game application by applying Cocos2d technology to be implemented on mobile devices based on IOS operating system. This study performs data collecting and analyzing, interface designing, application implementation, and application evaluation using the Waterfall Model. Data collection is withdrawn from several surveys related to user needs and similar games. Progressing the study, gameplay design is performed using UML, the data storage structure, and interface design. The study results in an Action RPG game application that is implemented on mobile devices. The results showes that Action RPG games can be developed by incorporating elements of art, graphics, and stories that enhance user's interests. 

  2. Defense Science Board 2006 Summer Study on Information Management for Net-Centric Operations. Volume 1: Main Report

    National Research Council Canada - National Science Library

    Schneider, Jr, William

    2007-01-01

    The task force addressed combat operations, information management, information assurance, and architecture requirements, as well as the architecture framework currently being pursued by the department...

  3. The nuclear industry's transition to risk-informed regulation and operation in the United States

    International Nuclear Information System (INIS)

    Kadak, Andrew C.; Matsuo, Toshihiro

    2007-01-01

    This paper summarizes a study of the transition of the United States nuclear industry from a prescriptive regulatory structure to a more risk informed approach to operations and regulations. The transition occurred over a 20 yr period in which gradual changes were made in the fundamental regulations and to the approach to nuclear safety and operations. While the number of actual regulatory changes were few, they are continuing. The utilities that embraced risk informed operations made dramatic changes in the way they approached operations and outage management. Those utilities that used risk in operations showed dramatic improvement in safety based on Institute of Nuclear Power Operations (INPO) performance indicators. It was also shown that the use of risk did not negatively affect safety performance of the plants compared to standard prescriptive approaches. This was despite having greater flexibility in compliance to regulatory standards and the use of the newly instituted risk-informed reactor oversight process. Key factors affecting the successful transition to a more risk-informed approach to regulations and operations are: strong top management support and leadership both at the regulator and the utility; education and training in risk principles and probabilistic risk Assessment tools for engineers, operators and maintenance staff; a slow and steady introduction of risk initiatives in areas that can show value to both the regulator and the industry; a transparent regulatory foundation built around a safety goal policy and the development of a strong safety culture at the utility to allow for more independence in safety compliance and risk management. The experience of the United States shows positive results in both safety and economics. The INPO and NRC metrics presented show that the use of risk information in operations and regulation is marginally better with no degradation in safety when plants that have embraced risk-informed approaches are compared

  4. Cracking ShadowCrypt: Exploring the Limitations of Secure I/O Systems in Internet Browsers

    Directory of Open Access Journals (Sweden)

    Freyberger Michael

    2018-04-01

    Full Text Available An important line of privacy research is investigating the design of systems for secure input and output (I/O within Internet browsers. These systems would allow for users’ information to be encrypted and decrypted by the browser, and the specific web applications will only have access to the users’ information in encrypted form. The state-of-the-art approach for a secure I/O system within Internet browsers is a system called ShadowCrypt created by UC Berkeley researchers [23]. This paper will explore the limitations of ShadowCrypt in order to provide a foundation for the general principles that must be followed when designing a secure I/O system within Internet browsers. First, we developed a comprehensive UI attack that cannot be mitigated with popular UI defenses, and tested the efficacy of the attack through a user study administered on Amazon Mechanical Turk. Only 1 of the 59 participants who were under attack successfully noticed the UI attack, which validates the stealthiness of the attack. Second, we present multiple attack vectors against Shadow-Crypt that do not rely upon UI deception. These attack vectors expose the privacy weaknesses of Shadow DOM—the key browser primitive leveraged by ShadowCrypt. Finally, we present a sketch of potential countermeasures that can enable the design of future secure I/O systems within Internet browsers.

  5. SSTL I/O Standard Based Environment Friendly Energy Efficient ROM Design on FPGA

    DEFF Research Database (Denmark)

    Bansal, Neha; Bansal, Meenakshi; Saini, Rishita

    2014-01-01

    are operating ROM with the highest operating frequency of 4th generation i7 processor to test the compatibility of this design with the latest hardware in use. When there is no demand of peak performance, then we can save 74.5% clock power, 75% signal power, and 30.83% I/O power by operating our device with 1......Stub Series Terminated Logic (SSTL) is an Input/output standard. It is used to match the impedance of line, port and device of our design under consideration. Therefore, selection of energy efficient SSTL I/O standard among available different class of SSTL logic family in FPGA, plays a vital role...

  6. Challenges when bringing IoT into Industrial Automation

    OpenAIRE

    Lennvall, Tomas; Gidlund, Mikael; Åkerberg, Johan

    2017-01-01

    The Internet of Things (IoT) is captivating the society because of its potential to rapidly transform businesses and people’s lives. It is widely believed that IoT will also transform the industrial automation business in terms of improved productivity, less cost, flexibility, and increased revenues. Hence, there are some challenges that needs to be addressed when IoT is introduced to the industrial automation domain. This paperaims to present realistic requirements and highlights identified ...

  7. A Step Towards Checking Security in IoT

    Directory of Open Access Journals (Sweden)

    Chiara Bodei

    2016-08-01

    Full Text Available The Internet of Things (IoT is smartifying our everyday life. Our starting point is IoT-LySa, a calculus for describing IoT systems, and its static analysis, which will be presented at Coordination 2016. We extend the mentioned proposal in order to begin an investigation about security issues, in particular for the static verification of secrecy and some other security properties.

  8. A Step Towards Checking Security in IoT

    OpenAIRE

    Bodei, Chiara; Degano, Pierpaolo; Ferrari, Gian-Luigi; Galletta, Letterio

    2016-01-01

    The Internet of Things (IoT) is smartifying our everyday life. Our starting point is IoT-LySa, a calculus for describing IoT systems, and its static analysis, which will be presented at Coordination 2016. We extend the mentioned proposal in order to begin an investigation about security issues, in particular for the static verification of secrecy and some other security properties.

  9. IoT Security Techniques Based on Machine Learning

    OpenAIRE

    Xiao, Liang; Wan, Xiaoyue; Lu, Xiaozhen; Zhang, Yanyong; Wu, Di

    2018-01-01

    Internet of things (IoT) that integrate a variety of devices into networks to provide advanced and intelligent services have to protect user privacy and address attacks such as spoofing attacks, denial of service attacks, jamming and eavesdropping. In this article, we investigate the attack model for IoT systems, and review the IoT security solutions based on machine learning techniques including supervised learning, unsupervised learning and reinforcement learning. We focus on the machine le...

  10. Xamarin mobile application development for iOS

    CERN Document Server

    Johnson, Paul F

    2013-01-01

    This book is a standard tutorial aimed at teaching you everything you need to know about iOS app development using Xamarin.This book is written for those who are new to iOS app development as well as more experienced developers who just need a quick reference book. It is assumed that you are already comfortable using C#. Those teaching iOS to new students will also find this book invaluable as a form of reference material.

  11. Application development with Parse using iOS SDK

    CERN Document Server

    Birani, Bhanu

    2013-01-01

    A practical guide, featuring step-by-step instructions showing you how to use Parse iOS, and handle your data on cloud.If you are a developer who wants to build your applications instantly using Parse iOS as a back end application development, this book is ideal for you. This book will help you to understand Parse, featuring examples to help you get familiar with the concepts of Parse iOS.

  12. Multiple Independent File Parallel I/O with HDF5

    Energy Technology Data Exchange (ETDEWEB)

    Miller, M. C.

    2016-07-13

    The HDF5 library has supported the I/O requirements of HPC codes at Lawrence Livermore National Labs (LLNL) since the late 90’s. In particular, HDF5 used in the Multiple Independent File (MIF) parallel I/O paradigm has supported LLNL code’s scalable I/O requirements and has recently been gainfully used at scales as large as O(106) parallel tasks.

  13. Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT.

    Science.gov (United States)

    Yan, Hongyang; Li, Xuan; Wang, Yu; Jia, Chunfu

    2018-06-04

    In recent years, the Internet of Things (IoT) has found wide application and attracted much attention. Since most of the end-terminals in IoT have limited capabilities for storage and computing, it has become a trend to outsource the data from local to cloud computing. To further reduce the communication bandwidth and storage space, data deduplication has been widely adopted to eliminate the redundant data. However, since data collected in IoT are sensitive and closely related to users' personal information, the privacy protection of users' information becomes a challenge. As the channels, like the wireless channels between the terminals and the cloud servers in IoT, are public and the cloud servers are not fully trusted, data have to be encrypted before being uploaded to the cloud. However, encryption makes the performance of deduplication by the cloud server difficult because the ciphertext will be different even if the underlying plaintext is identical. In this paper, we build a centralized privacy-preserving duplicate removal storage system, which supports both file-level and block-level deduplication. In order to avoid the leakage of statistical information of data, Intel Software Guard Extensions (SGX) technology is utilized to protect the deduplication process on the cloud server. The results of the experimental analysis demonstrate that the new scheme can significantly improve the deduplication efficiency and enhance the security. It is envisioned that the duplicated removal system with privacy preservation will be of great use in the centralized storage environment of IoT.

  14. Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT

    Directory of Open Access Journals (Sweden)

    Hongyang Yan

    2018-06-01

    Full Text Available In recent years, the Internet of Things (IoT has found wide application and attracted much attention. Since most of the end-terminals in IoT have limited capabilities for storage and computing, it has become a trend to outsource the data from local to cloud computing. To further reduce the communication bandwidth and storage space, data deduplication has been widely adopted to eliminate the redundant data. However, since data collected in IoT are sensitive and closely related to users’ personal information, the privacy protection of users’ information becomes a challenge. As the channels, like the wireless channels between the terminals and the cloud servers in IoT, are public and the cloud servers are not fully trusted, data have to be encrypted before being uploaded to the cloud. However, encryption makes the performance of deduplication by the cloud server difficult because the ciphertext will be different even if the underlying plaintext is identical. In this paper, we build a centralized privacy-preserving duplicate removal storage system, which supports both file-level and block-level deduplication. In order to avoid the leakage of statistical information of data, Intel Software Guard Extensions (SGX technology is utilized to protect the deduplication process on the cloud server. The results of the experimental analysis demonstrate that the new scheme can significantly improve the deduplication efficiency and enhance the security. It is envisioned that the duplicated removal system with privacy preservation will be of great use in the centralized storage environment of IoT.

  15. IoT interoperability : a hub-based approach

    OpenAIRE

    Blackstock, Michael; Lea, Rodger

    2014-01-01

    Interoperability in the Internet of Things is critical for emerging services and applications. In this paper we advocate the use of IoT ‘hubs’ to aggregate things using web protocols, and suggest a staged approach to interoperability. In the context of a UK government funded project involving 8 IoT projects to address cross-domain IoT interoperability, we introduce the HyperCat IoT catalogue specification. We then describe the tools and techniques we developed to adapt an existing data portal...

  16. Strong tidal dissipation in Io and Jupiter from astrometric observations.

    Science.gov (United States)

    Lainey, Valéry; Arlot, Jean-Eudes; Karatekin, Ozgür; Van Hoolst, Tim

    2009-06-18

    Io is the volcanically most active body in the Solar System and has a large surface heat flux. The geological activity is thought to be the result of tides raised by Jupiter, but it is not known whether the current tidal heat production is sufficiently high to generate the observed surface heat flow. Io's tidal heat comes from the orbital energy of the Io-Jupiter system (resulting in orbital acceleration), whereas dissipation of energy in Jupiter causes Io's orbital motion to decelerate. Here we report a determination of the tidal dissipation in Io and Jupiter through its effect on the orbital motions of the Galilean moons. Our results show that the rate of internal energy dissipation in Io (k(2)/Q = 0.015 +/- 0.003, where k(2) is the Love number and Q is the quality factor) is in good agreement with the observed surface heat flow, and suggest that Io is close to thermal equilibrium. Dissipation in Jupiter (k(2)/Q = (1.102 +/- 0.203) x 10(-5)) is close to the upper bound of its average value expected from the long-term evolution of the system, and dissipation in extrasolar planets may be higher than presently assumed. The measured secular accelerations indicate that Io is evolving inwards, towards Jupiter, and that the three innermost Galilean moons (Io, Europa and Ganymede) are evolving out of the exact Laplace resonance.

  17. Big Data Clustering via Community Detection and Hyperbolic Network Embedding in IoT Applications.

    Science.gov (United States)

    Karyotis, Vasileios; Tsitseklis, Konstantinos; Sotiropoulos, Konstantinos; Papavassiliou, Symeon

    2018-04-15

    In this paper, we present a novel data clustering framework for big sensory data produced by IoT applications. Based on a network representation of the relations among multi-dimensional data, data clustering is mapped to node clustering over the produced data graphs. To address the potential very large scale of such datasets/graphs that test the limits of state-of-the-art approaches, we map the problem of data clustering to a community detection one over the corresponding data graphs. Specifically, we propose a novel computational approach for enhancing the traditional Girvan-Newman (GN) community detection algorithm via hyperbolic network embedding. The data dependency graph is embedded in the hyperbolic space via Rigel embedding, allowing more efficient computation of edge-betweenness centrality needed in the GN algorithm. This allows for more efficient clustering of the nodes of the data graph in terms of modularity, without sacrificing considerable accuracy. In order to study the operation of our approach with respect to enhancing GN community detection, we employ various representative types of artificial complex networks, such as scale-free, small-world and random geometric topologies, and frequently-employed benchmark datasets for demonstrating its efficacy in terms of data clustering via community detection. Furthermore, we provide a proof-of-concept evaluation by applying the proposed framework over multi-dimensional datasets obtained from an operational smart-city/building IoT infrastructure provided by the Federated Interoperable Semantic IoT/cloud Testbeds and Applications (FIESTA-IoT) testbed federation. It is shown that the proposed framework can be indeed used for community detection/data clustering and exploited in various other IoT applications, such as performing more energy-efficient smart-city/building sensing.

  18. Big Data Clustering via Community Detection and Hyperbolic Network Embedding in IoT Applications

    Directory of Open Access Journals (Sweden)

    Vasileios Karyotis

    2018-04-01

    Full Text Available In this paper, we present a novel data clustering framework for big sensory data produced by IoT applications. Based on a network representation of the relations among multi-dimensional data, data clustering is mapped to node clustering over the produced data graphs. To address the potential very large scale of such datasets/graphs that test the limits of state-of-the-art approaches, we map the problem of data clustering to a community detection one over the corresponding data graphs. Specifically, we propose a novel computational approach for enhancing the traditional Girvan–Newman (GN community detection algorithm via hyperbolic network embedding. The data dependency graph is embedded in the hyperbolic space via Rigel embedding, allowing more efficient computation of edge-betweenness centrality needed in the GN algorithm. This allows for more efficient clustering of the nodes of the data graph in terms of modularity, without sacrificing considerable accuracy. In order to study the operation of our approach with respect to enhancing GN community detection, we employ various representative types of artificial complex networks, such as scale-free, small-world and random geometric topologies, and frequently-employed benchmark datasets for demonstrating its efficacy in terms of data clustering via community detection. Furthermore, we provide a proof-of-concept evaluation by applying the proposed framework over multi-dimensional datasets obtained from an operational smart-city/building IoT infrastructure provided by the Federated Interoperable Semantic IoT/cloud Testbeds and Applications (FIESTA-IoT testbed federation. It is shown that the proposed framework can be indeed used for community detection/data clustering and exploited in various other IoT applications, such as performing more energy-efficient smart-city/building sensing.

  19. BIM and IoT: A Synopsis from GIS Perspective

    Science.gov (United States)

    Isikdag, U.

    2015-10-01

    Internet-of-Things (IoT) focuses on enabling communication between all devices, things that are existent in real life or that are virtual. Building Information Models (BIMs) and Building Information Modelling is a hype that has been the buzzword of the construction industry for last 15 years. BIMs emerged as a result of a push by the software companies, to tackle the problems of inefficient information exchange between different software and to enable true interoperability. In BIM approach most up-to-date an accurate models of a building are stored in shared central databases during the design and the construction of a project and at post-construction stages. GIS based city monitoring / city management applications require the fusion of information acquired from multiple resources, BIMs, City Models and Sensors. This paper focuses on providing a method for facilitating the GIS based fusion of information residing in digital building "Models" and information acquired from the city objects i.e. "Things". Once this information fusion is accomplished, many fields ranging from Emergency Response, Urban Surveillance, Urban Monitoring to Smart Buildings will have potential benefits.

  20. BIM and IoT: A Synopsis from GIS Perspective

    Directory of Open Access Journals (Sweden)

    U. Isikdag

    2015-10-01

    Full Text Available Internet-of-Things (IoT focuses on enabling communication between all devices, things that are existent in real life or that are virtual. Building Information Models (BIMs and Building Information Modelling is a hype that has been the buzzword of the construction industry for last 15 years. BIMs emerged as a result of a push by the software companies, to tackle the problems of inefficient information exchange between different software and to enable true interoperability. In BIM approach most up-to-date an accurate models of a building are stored in shared central databases during the design and the construction of a project and at post-construction stages. GIS based city monitoring / city management applications require the fusion of information acquired from multiple resources, BIMs, City Models and Sensors. This paper focuses on providing a method for facilitating the GIS based fusion of information residing in digital building “Models” and information acquired from the city objects i.e. “Things”. Once this information fusion is accomplished, many fields ranging from Emergency Response, Urban Surveillance, Urban Monitoring to Smart Buildings will have potential benefits.

  1. OpenCV-Based Nanomanipulation Information Extraction and the Probe Operation in SEM

    Directory of Open Access Journals (Sweden)

    Dongjie Li

    2015-02-01

    Full Text Available Aimed at the established telenanomanipulation system, the method of extracting location information and the strategies of probe operation were studied in this paper. First, the machine learning algorithm of OpenCV was used to extract location information from SEM images. Thus nanowires and probe in SEM images can be automatically tracked and the region of interest (ROI can be marked quickly. Then the location of nanowire and probe can be extracted from the ROI. To study the probe operation strategy, the Van der Waals force between probe and a nanowire was computed; thus relevant operating parameters can be obtained. With these operating parameters, the nanowire in 3D virtual environment can be preoperated and an optimal path of the probe can be obtained. The actual probe runs automatically under the telenanomanipulation system's control. Finally, experiments were carried out to verify the above methods, and results show the designed methods have achieved the expected effect.

  2. Neutral hydrogen in elliptical and IO galaxies

    International Nuclear Information System (INIS)

    Bottinelli, L.; Gouguenheim, L.

    1979-01-01

    New HI detections have been obtained using the Nancay radiotelescope for NGC 2974 and 3962. These results and the large scale distribution obtained for NGC 3962 indicate that the HI-rich elliptical galaxies exhibit common properties which are not easily explained by accretion of an intergalactic cloud. The field aroud NGC 1052 has been mapped and there is an HI connection with the neighbouring galaxies. The HI content of several IO galaxies indicates that the galaxies which are members of groups are relatively HI-rich; this could be produced by additional HI coming from companion galaxies [fr

  3. Modeling IoT-based solutions using human-centric wireless sensor networks.

    Science.gov (United States)

    Monares, Álvaro; Ochoa, Sergio F; Santos, Rodrigo; Orozco, Javier; Meseguer, Roc

    2014-08-25

    The Internet of Things (IoT) has inspired solutions that are already available for addressing problems in various application scenarios, such as healthcare, security, emergency support and tourism. However, there is no clear approach to modeling these systems and envisioning their capabilities at the design time. Therefore, the process of designing these systems is ad hoc and its real impact is evaluated once the solution is already implemented, which is risky and expensive. This paper proposes a modeling approach that uses human-centric wireless sensor networks to specify and evaluate models of IoT-based systems at the time of design, avoiding the need to spend time and effort on early implementations of immature designs. It allows designers to focus on the system design, leaving the implementation decisions for a next phase. The article illustrates the usefulness of this proposal through a running example, showing the design of an IoT-based solution to support the first responses during medium-sized or large urban incidents. The case study used in the proposal evaluation is based on a real train crash. The proposed modeling approach can be used to design IoT-based systems for other application scenarios, e.g., to support security operatives or monitor chronic patients in their homes.

  4. Modeling IoT-Based Solutions Using Human-Centric Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Álvaro Monares

    2014-08-01

    Full Text Available The Internet of Things (IoT has inspired solutions that are already available for addressing problems in various application scenarios, such as healthcare, security, emergency support and tourism. However, there is no clear approach to modeling these systems and envisioning their capabilities at the design time. Therefore, the process of designing these systems is ad hoc and its real impact is evaluated once the solution is already implemented, which is risky and expensive. This paper proposes a modeling approach that uses human-centric wireless sensor networks to specify and evaluate models of IoT-based systems at the time of design, avoiding the need to spend time and effort on early implementations of immature designs. It allows designers to focus on the system design, leaving the implementation decisions for a next phase. The article illustrates the usefulness of this proposal through a running example, showing the design of an IoT-based solution to support the first responses during medium-sized or large urban incidents. The case study used in the proposal evaluation is based on a real train crash. The proposed modeling approach can be used to design IoT-based systems for other application scenarios, e.g., to support security operatives or monitor chronic patients in their homes.

  5. Design and Implementation of IoT Cloud Moveable SCADA Supported by GSM for Industrial Applications

    Directory of Open Access Journals (Sweden)

    Mahmoud Shaker Nasr

    2017-05-01

    Full Text Available The world at the beginning of a new era of innovation and development with the rise of the industrial Internet or Internet of Things, IoT. It takes the space through the convergence of the global industrial system with the power of advanced computing, analytics, and low cost sensor devices and innovation of communication allowed by the Internet. One of the most important developments is IoT SCADA systems, which are considered as infrastructure of society because of their potential enormous in several industrial applications. This paper presents the design of a new generation of SCADA, named moveable SCADA , based on IoT cloud, and supported by GSM for more flexibility and reliability. The system is applied to industrial application that consists of three-control processes which are temperature, liquid level and motor processes. The three control processes data acquisition and controllers are implemented using embedded microcontroller system while a gateway is used to transfer the data proceed in field supervisor at first as well as main supervisor and monitoring engineer through IoT cloud. The system supported by GSM unit to support the system in case of internet failure. Also a camera is added to the system in order to monitor any location, any location (determined by any of the authorities in the field where the camera is mounted. The proposed SCADA is implemented practically and tested for many cases; the presented obtained results demonstrate that the system operation is very fair and meet the required targets.

  6. Data Compatibility to Enhance Sustainable Capabilities for Autonomous Analytics in IoT

    Directory of Open Access Journals (Sweden)

    Kaleem Razzaq Malik

    2017-05-01

    Full Text Available The collection of raw data is based on sensors embedded in devices or the environment for real-time data extraction. Nowadays, the Internet of Things (IoT environment is used to support autonomous data collection by reducing human involvement. It is hard to analyze such data, especially when working with the sensors in a real-time environment. On using data analytics in IoT with the help of RDF, many issues can be resolved. Resultant data will have a better chance of quality analytics by reforming data into the semantical annotation. Industrial correspondence through data will be improved by the induction of semantics at large due to efficient data capturing, whereas one popular medium of sensors’ data storage is Relational Database (RDB. This study provides a complete automated mechanism to transform from loosely structured data stored in RDB into RDF. These data are obtained from sensors in semantically annotated RDF stores. The given study comprises methodology for improving compatibility by introducing bidirectional transformation between classical DB and RDF data stores to enhance the sustainable capabilities of IoT systems for autonomous analytics. Two case studies, one on weather and another on heart-rate measurement collections through IoT sensors, are used to show the transformation process in operation.

  7. Flujo de control en iOS Flow control in iOS

    Directory of Open Access Journals (Sweden)

    Franklin Hernández Castro

    2012-11-01

    Full Text Available El objetivo de este artículo es explicar los flujos de control que se usan en la programación de las aplicaciones en iOS, con el fin de resumir los aspectos más relevantes que se deben tomar en cuenta para programar una tarea a ser realizada por un dispositivo móvil del tipo iPhone o iPad. Debido a que el ambiente iOS es estrictamente orientado a objetos (OOP, los flujos de control no son obvios; además, los estándares de la firma Apple® definen patrones de diseño en el sistema que son altamente recomendados en este tipo de diseño. En este artículo se introducen algunos de ellos.This paper explain the control flows that are used by programming applications in iOS, trying to summarize the most important aspects to be considered by programming mobile devices like iPhone and iPad. Because iOS environment, is strictly a object-oriented one(OOP, control flows are not obvious, besides Apple® use design patterns highly recommended in this type of programming. Here we introduces some of them.

  8. Kajian Ios Apps dalam Peningkatan Produktifitas Perancangan Arsitektur

    Directory of Open Access Journals (Sweden)

    Riva Tomasowa

    2014-12-01

    Full Text Available The use of mobile device with sophisticated hardware and smart apps is a robust tool in terms of improving productivity nowadays, as well as to the dynamic architecture design process. The communication is not merely limited to formal audio and visual, but also bridges the data synchronisation, time and distance. However, this novel technology is not fully adopted to support the design process. This paper describes the built iOS apps which designed to aid the architects and then compares their potential on each design phases. Discussion of the analysis based on the design flow of the feasibility study (feasibility study to facilitymanagement - FM, which discusses the ability of CAAD in the design stage. In brief, the research shows the absence of rigid framework for interoperability that could accommodate two ways information exchange between apps and desktop applications.

  9. The role of information technology (IT) in reducing offshore operating costs

    International Nuclear Information System (INIS)

    Stern, M.J.

    1993-01-01

    The rapid changes in information technology (IT) and its application have helped to improve efficiency and reduce operating costs offshore. Developments in IT itself, in terms of technology, organization and standards together with cultural change have created new opportunities. In the application of IT, the most significant impact on operations costs and effectiveness has come from the use of information throughout the life cycle, and improved telecommunications. This paper describes recent developments in IT and its application, and cites examples where oil companies have derived major benefits

  10. Operating force information on-line acquisition of a novel slave manipulator for vascular interventional surgery.

    Science.gov (United States)

    Zhao, Yan; Guo, Shuxiang; Xiao, Nan; Wang, Yuxin; Li, Youxiang; Jiang, Yuhua

    2018-04-02

    Vascular interventional surgery has its advantages compared to traditional operation. Master-slave robotic technology can further improve the operation accuracy, efficiency and safety of this complicated and high risk surgery. However, on-line acquisition of operating force information of catheter and guidewire remains to be a significant obstacle on the path to enhancing robotic surgery safety. Thus, a novel slave manipulator is proposed in this paper to realize on-line sensing of guidewire torsional operating torque and axial operation force during robotic assisted operations. A strain sensor is specially designed to detect the small scale torsional operation torque with low rotational frequency. Additionally, the axial operating force is detected via a load cell, which is incorporated into a sliding mechanism to eliminate the influence of friction. For validation, calibration and performance evaluation experiments are conducted. The results indicate that the proposed operation torque and force detection device is effective. Thus, it can provide the foundation for enabling accurate haptic feedback to the surgeon to improve surgical safety.

  11. Understanding Strategic Information Manoeuvres in Network Media to Advance Cyber Operations: A Case Study Analysing Pro-Russian Separatists’ Cyber Information Operations in Crimean Water Crisis

    Directory of Open Access Journals (Sweden)

    Al-Khateeb Samer

    2016-06-01

    Full Text Available The inexpensive nature and wide availability of emerging media outlets, e.g. social networking sites and blogs makes them easy-to-use weapons, giving power and courage to individuals to form groups that are able to win or at least force concessions from stronger forces. Today, terrorist groups know that opinions can be influenced using networked media and this knowledge empowers and enables them to alienate their audience and sometimes provoke them into violent actions. To understand the strategic information manoeuvres used by such groups, e.g., trans-national terrorist groups, we study the channels (blogs, Twitter, etc. and methods (e.g., influential actors/groups they use to disseminate messages pertaining to recruitment, radicalization, and raising funds. We collect data from several sources, including over 130 blog websites known for pro-Russian propaganda for events such as the Crimean water crisis and Trident Juncture Exercise (TRJE 15. In addition to blogs, we collect data from Twitter for the above-mentioned events to study the crossinfluence of various social media platforms in conducting strategic information manoeuvres. The study shows that groups are able to spread their opinions and create emotional attitudes for their followers through the sophisticated and blended use of these network media platforms via powerful actors, trolls, and botnets. We design social and network science informed methodologies to study the sociotechnical behaviours of trolls and botnets and develop detection tools ready to be deployed for Cyber operations. The tools have been further tested in the information operations of ISIL, e.g., beheading of hostages in orange jump suits. This study helps identifying the actions needed to win this “battle of ideas”.

  12. Dynamic Data Driven Operator Error Early Warning System

    Science.gov (United States)

    2015-08-13

    data sources , gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this...after each cognitive activity is captured in an android device which doubles as the server for a wireless body area network (WBAN). Thus the operator...MindWave Mobile (NeuroSky, Inc., USA) will be a possible solution. NeuroSky is a non-invasive EEG that connects the user to iOS and Android platforms

  13. Spatiotemporal access model based on reputation for the sensing layer of the IoT.

    Science.gov (United States)

    Guo, Yunchuan; Yin, Lihua; Li, Chao; Qian, Junyan

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.

  14. SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers

    Directory of Open Access Journals (Sweden)

    Vishal Sharma

    2017-01-01

    Full Text Available Internet of things (IoT aims at bringing together large business enterprise solutions and architectures for handling the huge amount of data generated by millions of devices. For this aim, IoT is necessary to connect various devices and provide a common platform for storage and retrieval of information without fail. However, the success of IoT depends on the novelty of network and its capability in sustaining the increasing demand by users. In this paper, a self-aware communication architecture (SACA is proposed for sustainable networking over IoT devices. The proposed approach employs the concept of mobile fog servers which make relay using the train and unmanned aerial vehicle (UAV networks. The problem is presented based on Wald’s maximum model, which is resolved by the application of a distributed node management (DNM system and state dependency formulations. The proposed approach is capable of providing prolonged connectivity by increasing the network reliability and sustainability even in the case of failures. The effectiveness of the proposed approach is demonstrated through numerical and network simulations in terms of significant gains attained with lesser delay and fewer packet losses. The proposed approach is also evaluated against Sybil, wormhole, and DDoS attacks for analyzing its sustainability and probability of connectivity in unfavorable conditions.

  15. Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT

    Directory of Open Access Journals (Sweden)

    Yunchuan Guo

    2014-01-01

    Full Text Available Access control is a key technology in providing security in the Internet of Things (IoT. The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC. STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM and the election-based update mechanism (EUM. We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.

  16. Application of IoT concept on predictive maintenance of industrial equipment

    Directory of Open Access Journals (Sweden)

    Parpala Radu Constantin

    2017-01-01

    Full Text Available The Internet of Things (IoT concept describes an intelligent connectivity of smart devices using the internet network. Nowadays, companies try different approaches for predictive maintenance as a solution to reduce costs and the frequency of maintenance activities. The IoT platforms provide a good support for predictive maintenance as it can integrate information from different machines and manufacturing systems. The main drawback in integrating production system with IoT dedicated platforms is the communication framework, knowing that the main industrial communication protocols are incompatible with modern communication protocols implemented on IoT platforms. In this context, the present paper proposes a new and simple method for on-line monitoring and predictive maintenance of industrial equipment. This method has two features of connected manufacturing. One of these is process monitoring for constant quality assurance, the other one is condition monitoring in order to prevent unplanned downtimes. A case study is presented to demonstrate the feasibility of the proposed method.

  17. On the Users’ Acceptance of IoT Systems: A Theoretical Approach

    Directory of Open Access Journals (Sweden)

    Rino Falcone

    2018-03-01

    Full Text Available In the next future the IoT system will introduce extraordinary changes in our daily life. We will communicate with our domestic appliances to inform them about our preferences and goals and they will develop initiative and autonomy to be put at our service. But are we sure that we can afford all the automation they could offer? Are we able to manage it? Is it compatible with our cognitive attitudes and our actual and real goals? In this paper, we face the question of the IoT from the point of view of the user. We start analyzing which reasons undermine the acceptance of IoT systems and then we propose a possible solution. The first contribution of this work is the level characterization of the autonomy a user can grant to an IoT device. The second contribution is a theoretical model to deal with users and to stimulate users’ acceptance. By the means of simulation, we show how the model works and we prove that it leads the system to an optimal solution.

  18. Information needs in nuclear power plants during low power operation modes

    Energy Technology Data Exchange (ETDEWEB)

    Tommila, Teemu; Fantoni, Paolo F.; Zander, Ralf M.

    1998-02-01

    During the past few years an increasing attention has been paid to the safety of shutdown and refuelling operations. It has turned out that the risks during shutdown may be comparable to the risks of power operation. The goal of this report is to identify information requirements related to low power operating modes of nuclear power plants. These include, for example, warm and cold shutdowns, refuelling and maintenance, as well as related state transitions such as start-up and shut-down. The focus of the report is on planned refuelling outages and the role of the control room in managing the outage activities. As a starting point, the basic terminology and characteristics of low power operation are discussed. The current situation at nuclear power plants and some recent developments in information technology are reviewed. End-users' requirements and enabling technologies are combined in order to identify the opportunities for new information technology tools in low power operation. The required features of process control systems and maintenance information systems are described. Common plant modelling techniques, open software architectures and functional structuring of the process control system are suggested to be the key issues in the long-term development of operator support systems. On a shorter time scale, new tools solving limited practical problems should be developed and evaluated. This would provide a basis for the features needed for low power operation, including for example, outage planning, on-line risk monitoring, management of outage tasks, adaptive alarm handling, computerised procedures and task-oriented human interfaces. (author)

  19. Development of Information System for Patients with Cleft Lip and Palate undergoing Operation.

    Science.gov (United States)

    Augsornwan, Darawan; Pattangtanang, Pantamanas; Surakunprapha, Palakorn

    2015-08-01

    Srinagarind Hospital has 150-200 patients with cleft lip and palate each year. When patients are admitted to hospital for surgery patients and family feel they are in a crisis of life, they feel fear anxiety and need to know about how to take care of wound, they worry if patient will feel pain, how to feed patients and many things about patients. Information is very important for patients/family to prevent complications and help their decision process, decrease parents stress and encourage better co-operation. To develop information system for patients with cleft lip-palate undergoing operation. This is an action research divided into 3 phases. Phase 1 Situation review: in this phase we interview, nursing care observation, and review nursing documents about the information giving. Phase 2 Develop information system: focus groups, for discussion about what nurses can do to develop the system to give information to patients/parents. Phase 3 evaluation: by interviewing 61 parents using the structure questionnaire. 100 percent of patients/parents received information but some items were not received. Patients/parents satisfaction was 94.9 percent, no complications. The information system development provides optimal care for patients and family with cleft lip and palate, but needs to improve some techniques or tools to give more information and evaluate further the nursing outcome after.

  20. Man machine interaction for operator information systems : a general purpose display package on PC/AT

    International Nuclear Information System (INIS)

    Chandra, A.K.; Dubey, B.P.; Deshpande, S.V.; Vaidya, U.W.; Khandekar, A.B.

    1991-01-01

    Several operator information systems for nuclear plants have been developed at Reactor Control Division of BARC and these have involved extensive operator interaction to extract the maximum information from the systems. Each of these systems used a different scheme for operator interaction. A composite package has now been developed on PC/AT with EGA/VGA for use with any system to obviate the necessity to develop new software for each project. This permits information to be displayed in various formats viz. trend and history curves, tabular data, bar graphs and core matrix (both for 235 and 500 MWe cores). It also allows data to be printed and plotted using multi colour plotter. This package thus integrates all the features of the earlier systems. It also integrates the operator interaction scheme. It uses window based pull down menus to select parameters to be fed into a particular display format. Within any display format the operator has significant flexibility to modify the selected parameters using context dependent soft keys. The package also allows data to be retrieved in machine readable form. This report describes the various user friendly functions implemented and also the design of the system software. (author). 1 tab., 10 fig., 3 refs

  1. Geographic Response Information Network : a new tool to manage community information for oil spill contingency planning and response operations

    Energy Technology Data Exchange (ETDEWEB)

    Munger, M.; Bryant, T. [Cook Inlet Regional Citizen' s Advisory Council, Kenai, AK (United States); Haugstad, E.; Kwietniak, J. [Tesora Alaska Petroleum, Kenai, AK (United States); DeCola, E.; Robertson, T. [Nuka Research and Planning Group, Seldovia, AK (United States)

    2006-07-01

    This paper described the Geographic Response Information Network (GRIN) project which was launched to address some of the logistical challenges that often complicate oil spill and emergency response operations. The objective of the project was to develop a computer-based tool for incident logistics to organize maps and data related to oil spills, safety, public relations and basic community resources. In addition to its use for oil spill response planning, the data available can be useful for all-hazards emergency response planning. Early prototypes of the GRIN used PowerPoint slides to organize basic information about coastal communities in Alaska. With time, hyper text markup language (html) was used as the programming format because it can be more readily hyper-linked. Currently, GRIN is organized as a web page with the following 5 categories of information: general, liaison, public information, logistics and safety. There are several sub-headings under each category, such as location, people, economy, subsistence and transportation. This general information allows incident management personnel to obtain a community profile to better understand the cultural, social and economic basis of the community. The GRIN prototype was developed for the Kodiak urban area, but it may be expanded in the future to include other coastal communities in Alaska. 3 refs., 6 figs.

  2. Geographic Response Information Network : a new tool to manage community information for oil spill contingency planning and response operations

    International Nuclear Information System (INIS)

    Munger, M.; Bryant, T.; Haugstad, E.; Kwietniak, J.; DeCola, E.; Robertson, T.

    2006-01-01

    This paper described the Geographic Response Information Network (GRIN) project which was launched to address some of the logistical challenges that often complicate oil spill and emergency response operations. The objective of the project was to develop a computer-based tool for incident logistics to organize maps and data related to oil spills, safety, public relations and basic community resources. In addition to its use for oil spill response planning, the data available can be useful for all-hazards emergency response planning. Early prototypes of the GRIN used PowerPoint slides to organize basic information about coastal communities in Alaska. With time, hyper text markup language (html) was used as the programming format because it can be more readily hyper-linked. Currently, GRIN is organized as a web page with the following 5 categories of information: general, liaison, public information, logistics and safety. There are several sub-headings under each category, such as location, people, economy, subsistence and transportation. This general information allows incident management personnel to obtain a community profile to better understand the cultural, social and economic basis of the community. The GRIN prototype was developed for the Kodiak urban area, but it may be expanded in the future to include other coastal communities in Alaska. 3 refs., 6 figs

  3. Using accounting information systems by operations managers in a project company

    NARCIS (Netherlands)

    Wouters, Marc; van der Veeken, Henk J.M.

    2002-01-01

    This paper describes the results of a case study that investigated the use of accounting information by operations managers in a road building company. There was considerable preplanning before the execution of project activities, but task uncertainty during execution created the need to take

  4. 46 CFR 160.151-59 - Operating instructions and information for the ship's training manual.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 6 2010-10-01 2010-10-01 false Operating instructions and information for the ship's training manual. 160.151-59 Section 160.151-59 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) EQUIPMENT, CONSTRUCTION, AND MATERIALS: SPECIFICATIONS AND APPROVAL LIFESAVING EQUIPMENT Inflatable Liferafts (SOLAS) § 160.151-59...

  5. 78 FR 70163 - Communication of Operational Information between Natural Gas Pipelines and Electric Transmission...

    Science.gov (United States)

    2013-11-22

    ... Street NE., Washington, DC 20426, (202) 502-8931, [email protected] . Anna Fernandez (Legal Information), Office of the General Counsel, 888 First Street NE., Washington, DC 20426, (202) 502-6682, anna.... Questions Posed by the Commission 100. A. Generator to Electric Transmission Operator 100. Communications 1...

  6. Improving Civil-Military Information Sharing in Peace Support Operations Using a Service-Oriented Approach

    Science.gov (United States)

    2011-06-01

    solutions that operate reliable under adverse conditions including a bandwidth-limited environment, and provide them with customised information...236 Klein, G. (1998) Sources of Power: How people make decisions, MIT Press, Cambridge, Mass ., USA, 1998 NATO (2007) NATO Architecture Framework

  7. 77 FR 42004 - Proposed Extension of Existing Information Collection; Main Fan Operation and Inspection in Gassy...

    Science.gov (United States)

    2012-07-17

    ... Extension of Existing Information Collection; Main Fan Operation and Inspection in Gassy Underground Metal...) conditions in underground metal and nonmetal mines are largely controlled by the main mine fans. When accumulations of explosive gases, such as methane, are not swept from the mine by the main fans, they may...

  8. The Relationship between Chief Information Officer Transformational Leadership and Computing Platform Operating Systems

    Science.gov (United States)

    Anderson, George W.

    2010-01-01

    The purpose of this study was to relate the strength of Chief Information Officer (CIO) transformational leadership behaviors to 1 of 5 computing platform operating systems (OSs) that may be selected for a firm's Enterprise Resource Planning (ERP) business system. Research shows executive leader behaviors may promote innovation through the use of…

  9. 9 CFR 355.19 - Inspector to be informed when plant operates.

    Science.gov (United States)

    2010-01-01

    ... AND VOLUNTARY INSPECTION AND CERTIFICATION CERTIFIED PRODUCTS FOR DOGS, CATS, AND OTHER CARNIVORA... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Inspector to be informed when plant operates. 355.19 Section 355.19 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT...

  10. A Mapping Study on Cooperation between Information System Development and Operations

    NARCIS (Netherlands)

    Erich, Floris; Amrit, Chintan Amrit; Daneva, Maia; Jedlitschka, Andreas; Kuvaja, Pasi; Kuhrmann, Marco; Männistö, Tomi; Münch, Jürgen; Raatikainen, Mikko

    2014-01-01

    DevOps is a conceptual framework for reintegrating development and operations of Information Systems.We performed a Systematic Mapping Study to explore DevOps. 26 articles out of 139 were selected, studied and summarized. Based on this a concept table was constructed. We discovered that DevOps has

  11. Method of Choosing the Information Technology System Supporting Management of the Military Aircraft Operation

    Directory of Open Access Journals (Sweden)

    Barszcz Piotr

    2014-12-01

    Full Text Available The paper presents a method of choosing the information technology system, the task of which is to support the management process of the military aircraft operation. The proposed method is based on surveys conducted among direct users of IT systems used in aviation of the Polish Armed Forces. The analysis of results of the surveys was conducted using statistical methods. The paper was completed with practical conclusions related to further usefulness of the individual information technology systems. In the future, they can be extremely useful in the process of selecting the best solutions and integration of the information technology systems

  12. A survey of IoT cloud platforms

    Directory of Open Access Journals (Sweden)

    Partha Pratim Ray

    2016-12-01

    Full Text Available Internet of Things (IoT envisages overall merging of several “things” while utilizing internet as the backbone of the communication system to establish a smart interaction between people and surrounding objects. Cloud, being the crucial component of IoT, provides valuable application specific services in many application domains. A number of IoT cloud providers are currently emerging into the market to leverage suitable and specific IoT based services. In spite of huge possible involvement of these IoT clouds, no standard cum comparative analytical study has been found across the literature databases. This article surveys popular IoT cloud platforms in light of solving several service domains such as application development, device management, system management, heterogeneity management, data management, tools for analysis, deployment, monitoring, visualization, and research. A comparison is presented for overall dissemination of IoT clouds according to their applicability. Further, few challenges are also described that the researchers should take on in near future. Ultimately, the goal of this article is to provide detailed knowledge about the existing IoT cloud service providers and their pros and cons in concrete form.

  13. Analysis of DDoS-capable IoT malwares

    DEFF Research Database (Denmark)

    De Donno, Michele; Dragoni, Nicola; Giaretta, Alberto

    2017-01-01

    to the top Distributed Denial of Service (DDoS) attacks, making them more powerful and easier to achieve than ever. This paper aims at provide an up-to-date picture of DDoS attacks in the specific subject of the IoT, studying how these attacks work and considering the most common families in the IoT context...

  14. Sabatilles : Adaptació a iOS

    OpenAIRE

    Cots Sanfeliu, Jordi

    2015-01-01

    Adaptació del conte en format paper Sabatilles a aplicació en iOS per a dispositius mòbils d'Apple. Adaptación del cuento en formato papel Sabatilles a aplicación en iOS para dispositivos móviles de Apple. Bachelor thesis for the Computer Science program.

  15. Interaction between users and IoT clusters

    DEFF Research Database (Denmark)

    Shinde, Gitanjali; Olesen, Henning

    2015-01-01

    The Internet of Things (IoT) is paving the way for a vast number of objects in our environment to react, respond and work autonomously as and when required and as per their capability, role and position. They will be able to announce and offer their services to the users, and together this will e......The Internet of Things (IoT) is paving the way for a vast number of objects in our environment to react, respond and work autonomously as and when required and as per their capability, role and position. They will be able to announce and offer their services to the users, and together...... this will enable the vision of an "Internet of People, Things and Services" (IoPTS). Application areas for IoT include smart cities, smart homes, environmental control, security & emergency, retail, logistics, industrial control, smart farming, and e-Health. All the IoT objects are organized in clusters, which...... framework that is needed to realize IoPTS. In particular, we focus on the interaction between the users and the IoT clusters, where the user profile (role, privileges, and preferences) should be matched with the services offered by the IoT cluster, including the initial set-up, access control...

  16. On Energy Efficiency of Prioritized IoT Systems

    KAUST Repository

    Alabbasi, Abdulrahman; Shihada, Basem; Cavdar, Cicek

    2018-01-01

    The inevitable deployment of 5G and the Internet of Things (IoT) sheds the light on the importance of the energy efficiency (EE) performance of Device-to- Device (DD) communication systems. In this work, we address a potential IoT application, where

  17. Performance analysis of routing protocols for IoT

    Science.gov (United States)

    Manda, Sridhar; Nalini, N.

    2018-04-01

    Internet of Things (IoT) is an arrangement of advancements that are between disciplinary. It is utilized to have compelling combination of both physical and computerized things. With IoT physical things can have personal virtual identities and participate in distributed computing. Realization of IoT needs the usage of sensors based on the sector for which IoT is integrated. For instance, in healthcare domain, IoT needs to have integration with wearable sensors used by patients. As sensor devices produce huge amount of data, often called big data, there should be efficient routing protocols in place. To the extent remote systems is worried there are some current protocols, for example, OLSR, DSR and AODV. It additionally tosses light into Trust based routing protocol for low-power and lossy systems (TRPL) for IoT. These are broadly utilized remote directing protocols. As IoT is developing round the corner, it is basic to investigate routing protocols that and evaluate their execution regarding throughput, end to end delay, and directing overhead. The execution experiences can help in settling on very much educated choices while incorporating remote systems with IoT. In this paper, we analyzed different routing protocols and their performance is compared. It is found that AODV showed better performance than other routing protocols aforementioned.

  18. IoT Privacy and Security Challenges for Smart Home Environments

    OpenAIRE

    Huichen Lin; Neil W. Bergmann

    2016-01-01

    Often the Internet of Things (IoT) is considered as a single problem domain, with proposed solutions intended to be applied across a wide range of applications. However, the privacy and security needs of critical engineering infrastructure or sensitive commercial operations are very different to the needs of a domestic Smart Home environment. Additionally, the financial and human resources available to implement security and privacy vary greatly between application domains. In domestic enviro...

  19. CCM-R: Secure Counter Synchronization for IoT Wireless Link

    DEFF Research Database (Denmark)

    Roy, Upal; Yin, Jiachen; Andersen, Birger

    2016-01-01

    In this paper we propose and evaluate a new version of the CCM mode of operation, CCM-R, which isan extended and alternate version of the original CBC-MAC with Counter Mode(CCM) that was created to address the problem of counter synchronization. While CCM is considered secure when used/implemente...... it suitable for low-power wireless IoT devices....

  20. On the Benefits and Challenges of Crowd-Sourced Network Performance Measurements for IoT Scenarios

    DEFF Research Database (Denmark)

    Mikkelsen, Lars Møller; Madsen, Tatiana Kozlova; Schwefel, Hans-Peter

    2018-01-01

    Systems within IoT domains such as ITS, Smart City, Smart Grid and other, often rely on real-time information and communication. These types of systems often include geographically distributed nodes which are connected via cellular or other wireless networks. This means great variability and unce......Systems within IoT domains such as ITS, Smart City, Smart Grid and other, often rely on real-time information and communication. These types of systems often include geographically distributed nodes which are connected via cellular or other wireless networks. This means great variability...

  1. Plan for the design, development, and implementation, and operation of the National Water Information System

    Science.gov (United States)

    Edwards, M.D.

    1987-01-01

    The Water Resources Division of the U.S. Geological Survey is developing a National Water Information System (NWIS) that will integrate and replace its existing water data and information systems of the National Water Data Storage and Retrieval System, National Water Data Exchange, National Water-Use Information, and Water Resources Scientific Information Center programs. It will be a distributed data system operated as part of the Division 's Distributed Information System, which is a network of computers linked together through a national telecommunication network known as GEONET. The NWIS is being developed as a series of prototypes that will be integrated as they are completed to allow the development and implementation of the system in a phased manner. It also is being developed in a distributed manner using personnel who work under the coordination of a central NWIS Project Office. Work on the development of the NWIS began in 1983 and it is scheduled for completion in 1990. This document presents an overall plan for the design, development, implementation, and operation of the system. Detailed discussions are presented on each of these phases of the NWIS life cycle. The planning, quality assurance, and configuration management phases of the life cycle also are discussed. The plan is intended to be a working document for use by NWIS management and participants in its design and development and to assist offices of the Division in planning and preparing for installation and operation of the system. (Author 's abstract)

  2. Identification of the operating crew's information needs for accident management

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, W.R.; Hanson, D.J.; Ward, L.W.; Solberg, D.E.

    1988-01-01

    While it would be very difficult to predetermine all of the actions required to mitigate the consequences of every potential severe accident for a nuclear power plant, development of additional guidance and training could improve the likelihood that the operating crew would implement effective sever-accident management measures. The US Nuclear Regulatory Commission (NRC) is conducting an Accident Management Research Program that emphasizes the application of severe-accident research results to enhance the capability of the plant operating crew to effectively manage severe accidents. One element of this program includes identification of the information needed by the operating crew in severe-accident situations. This paper discusses a method developed for identifying these information needs and its application. The methodology has been applied to a generic reactor design representing a PWR with a large dry containment. The information needs were identified by systematically determining what information is needed to assess the health of the critical functions, identify the presence of challenges, select strategies, and assess the effectiveness of these strategies. This method allows the systematic identification of information needs for a broad range of severe-accident scenarios and can be validated by exercising the functional models for any specific event sequence.

  3. An IoT Based Predictive Connected Car Maintenance Approach

    Directory of Open Access Journals (Sweden)

    Rohit Dhall

    2017-03-01

    Full Text Available Internet of Things (IoT is fast emerging and becoming an almost basic necessity in general life. The concepts of using technology in our daily life is not new, but with the advancements in technology, the impact of technology in daily activities of a person can be seen in almost all the aspects of life. Today, all aspects of our daily life, be it health of a person, his location, movement, etc. can be monitored and analyzed using information captured from various connected devices. This paper discusses one such use case, which can be implemented by the automobile industry, using technological advancements in the areas of IoT and Analytics. ‘Connected Car’ is a terminology, often associated with cars and other passenger vehicles, which are capable of internet connectivity and sharing of various kinds of data with backend applications. The data being shared can be about the location and speed of the car, status of various parts/lubricants of the car, and if the car needs urgent service or not. Once data are transmitted to the backend services, various workflows can be created to take necessary actions, e.g. scheduling a service with the car service provider, or if large numbers of care are in the same location, then the traffic management system can take necessary action. ’Connected cars’ can also communicate with each other, and can send alerts to each other in certain scenarios like possible crash etc. This paper talks about how the concept of ‘connected cars’ can be used to perform ‘predictive car maintenance’. It also discusses how certain technology components, i.e., Eclipse Mosquito and Eclipse Paho can be used to implement a predictive connected car use case.

  4. A Low-Power WLAN Communication Scheme for IoT WLAN Devices Using Wake-Up Receivers

    Directory of Open Access Journals (Sweden)

    Hanseul Hong

    2018-01-01

    Full Text Available In this paper, we propose a delay- and power-efficient, multi-user, low-power wireless local area network (WLAN communication scheme for Internet of Things (IoT WLAN devices. Extremely low-power operation is one of the key requirements of emerging IoT devices. However, the current duty-cycle-based power saving approach may incur large access delay times owing to the trade-offs between the power consumption and the access delay. In order to reduce this delay and enhance the power-saving performance, wake-up receiver-based schemes have been proposed. However, because wake-up receiver-based schemes do not consider multiuser operation in dense communication environments, large delays are inevitable in the case of multiuser operation. In order to provide extremely low-power operation and under 1-mW standby power with reduced delay, we employed the optimized multiuser transmission scheduling of IEEE 802.11ax in the proposed scheme and proper enhanced distributed channel access (EDCA parameter settings. This is with the aim to reduce the delay caused by long wake-up times, and to avoid collisions caused by simultaneous transmission in uplink multiuser scenario. By using the proposed scheme, simultaneous IoT communication with multiple mobile IoT devices is possible while providing low-power operation. Simulation results verified the outstanding delay performance of the proposed scheme.

  5. Book Review: iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

    Directory of Open Access Journals (Sweden)

    Schulte Christopher

    2011-12-01

    Full Text Available Hoog, A., & Strzempka, K. (2011. iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices. Waltham, MA: Syngress. 336 pages, ISBN: 978-1-59749-659-9, US$69.95.Reviewed by Christopher Schulte, EnCE & ACE, LuciData Inc., Minneapolis, Minnesota (cschulte@lucidatainc.comThese are exciting times for Digital Forensics practitioners. While our examinations of mobile devices (including cell phones and tablet computers continue to bring new and sometimes hair-pulling challenges into our labs and on-site engagements, research and understanding of these tiny computers is increasing at what seems an exponential rate. This is especially true in the iOS (Apple Computer’s mobile operating system that powers the iPhone, iPad, iPod Touch and Apple TV space. The diligent work of talented computer scientists in this field allows examiners everywhere to reap the benefits of easier, faster and more effective examinations that yield more accurate and defendable results.(see PDF for full review

  6. [Design of an anesthesia and micro-environment information management system in mobile operating room].

    Science.gov (United States)

    Wang, Xianwen; Liu, Zhiguo; Zhang, Wenchang; Wu, Qingfu; Tan, Shulin

    2013-08-01

    We have designed a mobile operating room information management system. The system is composed of a client and a server. A client, consisting of a PC, medical equipments, PLC and sensors, provides the acquisition and processing of anesthesia and micro-environment data. A server is a powerful computer that stores the data of the system. The client gathers the medical device data by using the C/S mode, and analyzes the obtained HL7 messages through the class library call. The client collects the micro-environment information with PLC, and finishes the data reading with the OPC technology. Experiment results showed that the designed system could manage the patient anesthesia and micro-environment information well, and improve the efficiency of the doctors' works and the digital level of the mobile operating room.

  7. Antiviral Information Management System (AIMS): a prototype for operational innovation in drug development.

    Science.gov (United States)

    Jadhav, Pravin R; Neal, Lauren; Florian, Jeff; Chen, Ying; Naeger, Lisa; Robertson, Sarah; Soon, Guoxing; Birnkrant, Debra

    2010-09-01

    This article presents a prototype for an operational innovation in knowledge management (KM). These operational innovations are geared toward managing knowledge efficiently and accessing all available information by embracing advances in bioinformatics and allied fields. The specific components of the proposed KM system are (1) a database to archive hepatitis C virus (HCV) treatment data in a structured format and retrieve information in a query-capable manner and (2) an automated analysis tool to inform trial design elements for HCV drug development. The proposed framework is intended to benefit drug development by increasing efficiency of dose selection and improving the consistency of advice from US Food and Drug Administration (FDA). It is also hoped that the framework will encourage collaboration among FDA, industry, and academic scientists to guide the HCV drug development process using model-based quantitative analysis techniques.

  8. Mobile Virtual Network Operator Information Systems for Increased Sustainability in Utilities

    DEFF Research Database (Denmark)

    Joensen, Hallur Leivsgard; Tambo, Torben

    2011-01-01

    sales from efficiency of business processes, underlying information systems, and the ability to make the link from consumption to cost visual and transparent to consumers. The conclusion is that the energy sector should look into other sectors and learn from information systems which ease up business......, sales and buying processes are separated from physical networks and energy production. This study aims to characterise and evaluate information systems supporting the transformation of the free market-orientation of energy and provision of utilities in a cross-sectorial proposition known as Mobile...... Virtual Network Operator (MVNO). Emphasis is particularly on standardised information systems for automatically linking consumers, sellers and integration of network infrastructure actors. The method used is a feasibility study assessing business and information processes of a forthcoming utilities market...

  9. An ARM-Compliant Architecture for User Privacy in Smart Cities: SMARTIE—Quality by Design in the IoT

    OpenAIRE

    Beltran, V.; Skarmeta, A. F.; Ruiz, P. M.

    2017-01-01

    Much has been said about the benefits that the Internet of Things (IoT) will bring to citizens’ life. Countless smart objects will be soon offering autonomous behavior in smart environments by sensing the physical world around us, collecting information about us, and taking proactive actions (many times without our consent) with the ultimate goal of improving our wellness. Without a strong guarantee on user privacy, the IoT may sound scary for many citizens. Indeed, the IoT-Architecture Refer...

  10. Supporting Analysis and Audit of Collaborative OAIS’s by use of an Outer OAIS – Inner OAIS (OO-IO) Model

    DEFF Research Database (Denmark)

    Zierau, Eld; McGovern, Nancy

    2014-01-01

    the known threats to digital content through time. The main purpose of the paper is to present an Outer OAIS-Inner OAIS (OO-IO) Model that can support the analysis and audit of collaborative interactions between multiple OAIS’s to enable distributed digital preservation. The paper provides extensive...... explanations and diagrams to demonstrate the ability of the OO-IO model to address distributed digital preservation conformance with the Open Archival Information System (OAIS) Reference Model. It is argued that the OO-IO model contributes a necessary extension to the literature of the digital preservation...... community to address the analysis and audit necessary for distributed digital preservation....

  11. Hash-chain-based authentication for IoT

    Directory of Open Access Journals (Sweden)

    Antonio PINTO

    2016-12-01

    Full Text Available The number of everyday interconnected devices continues to increase and constitute the Internet of Things (IoT. Things are small computers equipped with sensors and wireless communications capabilities that are driven by energy constraints, since they use batteries and may be required to operate over long periods of time. The majority of these devices perform data collection. The collected data is stored on-line using web-services that, sometimes, operate without any special considerations regarding security and privacy. The current work proposes a modified hash-chain authentication mechanism that, with the help of a smartphone, can authenticate each interaction of the devices with a REST web-service using One Time Passwords (OTP while using open wireless networks. Moreover, the proposed authentication mechanism adheres to the stateless, HTTP-like behavior expected of REST web-services, even allowing the caching of server authentication replies within a predefined time window. No other known web-service authentication mechanism operates in such manner.

  12. A comprehensive operating room information system using the Kinect sensors and RFID.

    Science.gov (United States)

    Nouei, Mahyar Taghizadeh; Kamyad, Ali Vahidian; Soroush, Ahmad Reza; Ghazalbash, Somayeh

    2015-04-01

    Occasionally, surgeons do need various types of information to be available rapidly, efficiently and safely during surgical procedures. Meanwhile, they need to free up hands throughout the surgery to necessarily access the mouse to control any application in the sterility mode. In addition, they are required to record audio as well as video files, and enter and save some data. This is an attempt to develop a comprehensive operating room information system called "Medinav" to tackle all mentioned issues. An integrated and comprehensive operating room information system is introduced to be compatible with Health Level 7 (HL7) and digital imaging and communications in medicine (DICOM). DICOM is a standard for handling, storing, printing, and transmitting information in medical imaging. Besides, a natural user interface (NUI) is designed specifically for operating rooms where touch-less interactions with finger and hand tracking are in use. Further, the system could both record procedural data automatically, and view acquired information from multiple perspectives graphically. A prototype system is tested in a live operating room environment at an Iranian teaching hospital. There are also contextual interviews and usability satisfaction questionnaires conducted with the "MediNav" system to investigate how useful the proposed system could be. The results reveal that integration of these systems into a complete solution is the key to not only stream up data and workflow but maximize surgical team usefulness as well. It is now possible to comprehensively collect and visualize medical information, and access a management tool with a touch-less NUI in a rather quick, practical, and harmless manner.

  13. Improving Water Resources System Operation by Direct Use of Hydroclimatic Information

    Science.gov (United States)

    Castelletti, A.; Pianosi, F.

    2011-12-01

    It is generally agreed that more information translates into better decisions. For instance, the availability of inflow predictions can improve reservoir operation; soil moisture data can be exploited to increase irrigation efficiency; etc. However, beyond this general statement, many theoretical and practical questions remain open. Provided that not all information sources are equally relevant, how does their value depend on the physical features of the water system and on the purposes of the system operation? What is the minimum lead time needed for anticipatory management to be effective? How does uncertainty in the information propagates through the modelling chain from hydroclimatic data through descriptive and decision models, and finally affect the decision? Is the data-predictions-decision paradigm truly effective or would it be better to directly use hydroclimatic data to take optimal decisions, skipping the intermediate step of hydrological forecasting? In this work we investigate these issues by application to the management of a complex water system in Northern Vietnam, characterized by multiple, conflicting objectives including hydropower production, flood control and water supply. First, we quantify the value of hydroclimatic information as the improvement in the system performances that could be attained under the (ideal) assumption of perfect knowledge of all future meteorological and hydrological input. Then, we assess and compare the relevance of different candidate information (meteorological or hydrological observations; ground or remote data; etc.) for the purpose of system operation by novel Input Variable Selection techniques. Finally, we evaluate the performance improvement made possible by the use of such information in re-designing the system operation.

  14. Light-Weight and Versatile Monitor for a Self-Adaptive Software Framework for IoT Systems

    Directory of Open Access Journals (Sweden)

    Young-Joo Kim

    2016-01-01

    Full Text Available Today, various Internet of Things (IoT devices and applications are being developed. Such IoT devices have different hardware (HW and software (SW capabilities; therefore, most applications require customization when IoT devices are changed or new applications are created. However, the applications executed on these devices are not optimized for power and performance because IoT device systems do not provide suitable static and dynamic information about fast-changing system resources and applications. Therefore, this paper proposes a light-weight and versatile monitor for a self-adaptive software framework to automatically control system resources according to the system status. The monitor helps running applications guarantee low power consumption and high performance for an optimal environment. The proposed monitor has two components: a monitoring component, which provides real-time static and dynamic information about system resources and applications, and a controlling component, which supports real-time control of system resources. For the experimental verification, we created a video transport system based on IoT devices and measured the CPU utilization by dynamic voltage and frequency scaling (DVFS for the monitor. The results demonstrate that, for up to 50 monitored processes, the monitor shows an average CPU utilization of approximately 4% in the three DVFS modes and demonstrates maximum optimization in the Performance mode of DVFS.

  15. Internet of robotic things : converging sensing/actuating, hypoconnectivity, artificial intelligence and IoT Platforms

    OpenAIRE

    Vermesan, Ovidiu; Bröring, Arne; Tragos, Elias; Serrano, Martin; Bacciu, Davide; Chessa, Stefano; Gallicchio, Claudio; Micheli, Alessio; Dragone, Mauro; Saffiotti, Alessandro; Simoens, Pieter; Cavallo, Filippo; Bahr, Roy

    2017-01-01

    The Internet of Things (IoT) concept is evolving rapidly and influencing newdevelopments in various application domains, such as the Internet of MobileThings (IoMT), Autonomous Internet of Things (A-IoT), Autonomous Systemof Things (ASoT), Internet of Autonomous Things (IoAT), Internetof Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc.that are progressing/advancing by using IoT technology. The IoT influencerepresents new development and deployment challenges in different a...

  16. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications.

    Science.gov (United States)

    Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis

    2016-12-24

    The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.

  17. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications

    Directory of Open Access Journals (Sweden)

    Tiago M. Fernández-Caramés

    2016-12-01

    Full Text Available The Internet of Things (IoT is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification, which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3 to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.

  18. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications

    Science.gov (United States)

    Fernández-Caramés, Tiago M.; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis

    2016-01-01

    The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol. PMID:28029119

  19. Towards multi-layer interoperability of heterogeneous IoT platforms : the INTER-IoT approach

    NARCIS (Netherlands)

    Fortino, Giancarlo; Savaglio, Claudio; Palau, Carlos E.; de Puga, Jara Suarez; Ghanza, Maria; Paprzycki, Marcin; Montesinos, Miguel; Liotta, Antonio; Llop, Miguel; Gravina, R.; Palau, C.E.; Manso, M.; Liotta, A.; Fortino, G.

    2018-01-01

    Open interoperability delivers on the promise of enabling vendors and developers to interact and interoperate, without interfering with anyone’s ability to compete by delivering a superior product and experience. In the absence of global IoT standards, the INTER-IoT voluntary approach will support

  20. Volcanic Origin of Alkali Halides on Io

    Science.gov (United States)

    Schaefer, L.; Fegley, B., Jr.

    2003-01-01

    The recent observation of NaCl (gas) on Io confirms our earlier prediction that NaCl is produced volcanically. Here we extend our calculations by modeling thermochemical equilibrium of O, S, Li, Na, K, Rb, Cs, F, Cl, Br, and I as a function of temperature and pressure in a Pele-like volcanic gas with O/S/Na/Cl/K = 1.518/1/0.05/0.04/0.005 and CI chondritic ratios of the other (as yet unobserved) alkalis and halogens. For reference, the nominal temperature and pressure for Pele is 1760 plus or minus 210 K and 0.01 bars based on Galileo data and modeling.